Chapter 5 Digital Safety and Security – Flashcards
Unlock all answers in this set
Unlock answersquestion
cyberextortionist
answer
Someone who demands payment to stop an attack on an organization's technology infrastructure.
question
spyware
answer
A program placed on a computer or mobile device without the user's knowledge that secretly collects information about the user and then communicates the information it collects to some outside source while the user is online.
question
unauthorized access and use
answer
An employee using an organization's computer to send personal email messages might be an example of ____.
question
passphrase
answer
A private combination of words, often containing mixed capitalization and punctuation, associated with a user name that allows access to certain computer resources.
question
expansion
answer
A(n) ____ encryption algorithm inserts characters between existing characters.
question
encryption key
answer
A set of characters that the originator of the data uses to encrypt the plaintext and the recipient of the data uses to decrypt the ciphertext.
question
continuous data protection (CDP)
answer
A(n) _____ backup method is the only real-time backup, providing very fast recovery of data.
question
session cookie
answer
Online shopping websites generally use a ____ to keep track of items in a user's shopping cart.
question
digital security risk
answer
Any event or action that could cause a loss of or damage to computer or mobile device hardware, software, data, information, or processing capability.
question
bot
answer
A program that performs a repetitive task on a network.
question
zombie
answer
A compromised computer or device whose owner is unaware the computer or device is being controlled remotely by an outsider.
question
denial of service attack (DoS attack)
answer
An assault whose purpose is to disrupt computer access to an Internet service such as the web or email.
question
spoofing
answer
A technique intruders use to make their network or Internet transmissions appear legitimate to a victim computer or network.
question
back door
answer
A program or set of instructions in a program that allows users to bypass security controls when accessing a program, computer, or network.
question
access control
answer
A security measure that defines who can access a computer, device, or network, when they can access it, and what actions they can take while accessing it.
question
cyberforensics
answer
The discovery, collection, and analysis of evidence found on computers and networks.
question
digital certificate
answer
A notice that guarantees a user or a website is legitimate.
question
digital rights management
answer
A strategy designed to prevent illegal distribution of movies, music, and other digital content.
question
cyberwarfare
answer
A cybercrime attack whose goal ranges from disabling a government's computer network to crippling a country.