Computer Concepts Ch.9

¡Supera tus tareas y exámenes ahora con Quizwiz!

employee-monitoring software

These programs record virtually everything you do on your computer. One proposed law would not prohibit this type of electronic monitoring but would require employers to provide prior written notice. Employers also would have to alert employees during the monitoring with some sort of audible or visual signal. If you are employed and would like to know your company's current policy on monitoring electronic communication, contact your human relations department.

Virtual private networks: Virtual private networks (VPNs)

encrypt connections between company networks and remote users such as workers connecting from home. This connection creates a secure virtual connection to a company LAN across the Internet.

Password managers

help you create strong passwords. Additionally, they will store all your passwords in one location and automatically provide the appropriate password when requested from one of your favorite sites.

electronic profiles

highly detailed and personalized descriptions of individuals.

Mistaken Identity

in which the electronic profile of one person is switched with another.

Security

involves protecting individuals and organizations from theft and danger.

Malicious Programs A cracker

is a computer criminal who creates and distributes malicious programs.

Accuracy

relates to the responsibility of those who collect data to ensure that the data is correct.

Computer Ethics

are guidelines for the morally acceptable use of computers in our society.

Phishing

attempts to trick Internet users into thinking a fake but official-looking website or e-mail is legitimate. Phishing has grown in sophistication, replicating entire websites like PayPal to try to lure users into divulging their financial information.

Privacy

concerns the collection and use of data about individuals. There are three primary privacy issues:

botnet, or robot network

A collection of zombie computers is known as

Cyber Bullying

A fairly recent and all-too-common phenomenon, cyberbullying is the use of the Internet, smartphones, or other devices to send or post content intended to hurt or embarrass another person.

information resellers or information brokers

A vast industry of data gatherers who collects, analyzes, and sells such personal data.

Computer Fraud and Abuse Act

Creating and knowingly spreading a virus is a very serious crime and a federal offense punishable under the

digital rights management (DRM)

DRM encompasses various technologies that control access to electronic media and files. Typically, DRM is used to (1) control the number of devices that can access a given file and (2) limit the kinds of devices that can access a file.

Big data

Effectively, every digital event—whether using a telephone or smartphone, buying a product or service, or sending or receiving any electronic communication—is collected and recorded. As a result, the size and the number of databases are exploding. In fact, it is widely reported that 90 percent of all of today's digitally stored data was collected in just the last two years. This ever-growing volume of data is often referred to as

Preventing Data Loss

Equipment can always be replaced. A company's data, however, may be irreplaceable. Most companies have ways of trying to keep software and data from being tampered with in the first place.

Data Manipulation

Finding entry into someone's computer network and leaving a prankster's message may seem like fun, which is why hackers do it. It is still against the law. Moreover, even if the manipulation seems harmless, it may cause a great deal of anxiety and wasted time among network users.

Rogue Wi-Fi Hotspots

Free Wi-Fi networks are available almost everywhere from libraries to fast-food restaurants and coffee shops. imitate these free networks. These rogue networks operate close to the legitimate free hotspots and typically provide stronger signals that many users unsuspectingly connect to.

Wireless network encryption

Restricts access to authorized users on wireless networks. WPA2 (Wi-Fi Protected Access) is the most widely used wireless network encryption for home wireless networks. WPA2 is typically established for a wireless network through the network's wireless router. While the specifics vary between routers, WPA2 is usually set through the router's settings options.

Website Encryption

Secures web transactions, especially financial transactions. Web pages that accept passwords or confidential information like a credit card number are often encrypted.

Restricting Access

Security experts are constantly devising ways to protect computer systems from access by unauthorized persons. Sometimes security is a matter of putting guards on company computer rooms and checking the identification of everyone admitted.

malware, which is short for malicious software.

They are specifically designed to damage or disrupt a computer system. The three most common types of malware are viruses, worms, and Trojan horses.

Encrypting Data

Whenever information is sent over a network or stored on a computer system, the possibility of unauthorized access exists.

Firewalls

act as a security buffer between a corporation's private network and all external networks, including the Internet.

Zombies

are computers infected by a virus, worm, or Trojan horse that allows them to be remotely controlled for malicious purposes.

Trojan horses

are programs that appear to be harmless; however, they contain malicious programs. Trojan horses are not viruses. Like worms, however, they can be carriers of viruses. The most common types of Trojan horses appear as free computer games and free screensaver programs that can be downloaded from the Internet.

Worms

are programs that simply replicate themselves over and over again.

IT security analysts

are responsible for maintaining the security of a company's networks, systems, and data.

Ethics

are standards of moral conduct

Denial of Service A denial of service (DoS) attack

attempts to slow down or stop a computer system or network by flooding a computer or network with requests for information and data. The targets of these attacks are usually Internet service providers (ISPs) and specific websites.

disaster recovery plans

describing ways to continue operating until normal computer operations can be restored.

Biometric Scanning

devices such as fingerprint and iris (eye) scanners.

Internet Scams or Scam

is a fraudulent or deceptive act or operation designed to trick individuals into providing personal information or spending their time and money for little or no return. is simply a scam using the Internet. Internet scams are becoming a serious problem and have created financial and legal problems for many thousands of people.

Cybercrime or computer crime

is any criminal offense that involves a computer and a network. It was recently estimated that cybercrime affects over 400 million people and costs over $400 billion each year.

Physical security

is concerned with protecting hardware from possible human and natural disasters.

Data Security

is concerned with protecting software and data from unauthorized tampering or damage.

Identity theft

is the illegal assumption of someone's identity for the purposes of economic gain. It is one of the fastest-growing crimes in the country and can financially devastate its victim.

https (hypertext transfer protocol secure)

is the most widely used Internet protocol. This protocol requires that the browser and the connecting site encrypt all messages, providing a safer and more secure transmission.

Software piracy

is the unauthorized copying and/or distribution of software. According to a recent study, software piracy costs the software industry over $60 billion annually.

Computer Fraud and Abuse Act

makes it a crime for unauthorized persons even to view—let alone copy or damage—data using any computer across state lines. It also prohibits unauthorized use of any government computer or a computer used by any federally insured financial institution. Offenders can be sentenced to up to 20 years in prison and fined up to $100,000.

Digital Millennium Copyright Act

makes it illegal to deactivate or otherwise disable any antipiracy technologies including DRM technologies. The act also establishes that copies of commercial programs may not be legally resold or given away.

Security Suites

provide a collection of utility programs designed to protect your privacy and security while you are on the web.

Access

relates to the responsibility of those who have data to control who is able to use that data.

Property

relates to who owns data.

Encryption

the process of coding information to make it unreadable except to those who have a special piece of information known as an encryption key, or, simply, a key. Some common uses for encryption include

Dictionary Attack

uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account.

Freedom of information act

you are also entitled to look at your records held by government agencies.

Anticipating Disasters

Companies (and even individuals) should prepare themselves for disasters

E mail Encryption

Protects e-mail messages as they move across the Internet.

File Encryption

Protects sensitive files by encrypting them before they are stored on a hard drive.

Copyright

is a legal concept that gives content creators the right to control use and distribution of their work.


Conjuntos de estudio relacionados

APUSH ch 12 quiz, APUSH Ch 13 quiz, APUSH Ch 14 quiz, APUSH ch 15 quiz

View Set

Hacker Techniques Tools and Incident Handling

View Set

Chapter 3: Communication & Culture

View Set

Business Environment and Trade: The International Landscape

View Set