Chapter 5.1 Analysis

Unlock all answers in this set

Unlock answers
question
Acceptable use Policy
answer
Outline the activity for which a computer and network may be used
question
Access Control
answer
a security measure that defines who can access a computer device or network
question
Adware
answer
a program that displays an online advertisement in a banner or pop up ad
question
Audit trail
answer
an electronic file that that records both successful and unsuccessful access attempts
question
Back Door
answer
a program or set of instructions in a program that allows users to bypass security control
question
Biometric Device
answer
device that authenticates a personal characteristic into a digital code
question
Back up
answer
a duplicate of content on a storage medium that you can use
question
Biometric payment
answer
payment method in which the customers fingerprints is read by a finger print reader that is linked to a payment method
question
Bot
answer
a program that preforms a repetitive task on a network
question
Bot Net
answer
a group of compromised computer or mobile devices connected to a network that are used to attack other networks
question
Browsing History
answer
a list of all websites you have visited over a period of time
question
Business software alliance
answer
alliance formed by major worldwide software companies to promote the understanding software privacy
question
CAPTCHA
answer
a program that displays an image containing distorted characters for a user to identify and enter in to verify that they are human and not a computer program
question
Certificate authority
answer
online program that issues digital certificates
question
Cert/CC
answer
a federally funded internet security and research development center
question
Child
answer
terminal in the third generation backup to refer to the most recent back up
question
Cyphr text
answer
encrypted data
question
Click Jacking
answer
scam in which an object that can be clicked on a website such as a button image or link contains malicious program
question
Cloud Back up
answer
backup method in which files are backed up tot he cloud as they change
question
Code of Conduct
answer
a written guideline that helps determine weather a specific acting is ethical or unethical or allowed or not allowed
question
Computer Crime
answer
any illegal act involves the use of a computer or related device
question
Computer Emergency response team coordinate center
answer
a federally funded internet security research and development center
question
Computer ethics
answer
the moral guidelines that govern the use of computers mobile devices and information systems
question
Content Filtering
answer
the process of restoring certain material
question
Continuous data protection
answer
backup method in which all data is backed up when ever a change is made
question
Cookie
answer
a small text file that a webserver stores on your computer
question
Copyright
answer
exclusive rights given to authors artists and other creators of original work to duplicate publish and sell their materials
question
Cracker
answer
some one who accesses a computer or network illegally with the internet of destroying data and stealing information
question
Crime ware
answer
software used by cyber criminals
question
Cyber crime
answer
online or internet based illegal acts
question
Cyber extortionists
answer
someone who demands payment to stop an attack on an organized technology infrastructure
question
Cyber Forensics
answer
the discovery collection and analysis of evidence found on computer and networks
question
Cyber Terrorists
answer
some one who uses the internet or network to destroy or damage computers for political reasons
question
Cyber warfare
answer
a cyber attack whose goal ranges from disabling a government computer network to crippling a country
question
decrypt
answer
the process of decoding encrypted data
question
Denial of service attack
answer
an assault whose purpose is to disrupt computer access to an internet service
question
Differential back up
answer
backup method that copies only the files that have changed since the last full back up
question
Digital rights management
answer
a strategy designed to prevent illegal distribution of movies music and other digital content
question
Digital security risk
answer
an event or action hat can cause a loss or damage to computer or mobile device hardware software data information or processing capabilities
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New