CH 1: Lesson 5 - Computer Security

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Stolen data

private information can be stolen from your home computer or business office. hackers that gain control of your computer, network, or applications can access data they find stored in those locations.

Intercepted data

private information that is sent between locations can be intercept by someone that is monitoring the communications. for example if you enter a username and a password in a website those things must go from your computer across the internet to the web server.

security risk

result in private information being lost or used incorrectly.

Backup Plan

that saves all of your important emails, files, and other documents somewhere outside your computer.

Private information

your social security number, your bank records, your health records, and your social media usernames and passwords are likely available on your computer or through website that holds your accounts.

Health Insurance Portability and Accountability Act (HIPPA)

A law that protects patients in hospitals and doctors offices.

Personal Strategies (6 strategies)

Avoid giving out personal information. Never share your private login to a service with someone else. Use a strong password that is hard for others to guess. Avoid clicking on unknown links. Criminals can set up fake websites that look exactly like the login page to your sensitive areas.

Children's Online Privacy Protection Act (COPPA)

Created to protect children on the Internet. The COPPA law gives parents control over the type of information that website operators can collect from children under 13 years old.

Computer fraud and Abuse Act (CFAA)

Enacted in 1986 to address rising problems with computer hacking. This federal law prohibits unauthorized access to computers and networks in the United States.

Electronic Communication Privacy Act (ECPA)

Enacted to include electronic data in the list of things that the government is forbidden to intercept through wire taps or other eavesdropping.

System Scan

Every file on your computer is checked by the anti-virus software.

U.S Copyright Act

Gives computer programs the same copyright status as literary works. This means that software is protected from illegal copying.

Confidentiality

In order to better provide data security, companies have come up with a business model.

Integrity

Involves maintaining the consistency, accuracy, and trustworthiness of your data.

confidential information

New product plans, marketing strategies, customer list, competitive analysis, and other important business information should be kept securely within the company and not leaked outside.

Malware

Programs might change the behavior of your computer to show you unwanted advertising track your online activity, or steal your personal information.

Virus

Programs that are designed to damage your computer or allow a remote user to control your system.

Quarantine

The file is not deleted, but has been moved to a sort of "file jail" where it cannot do any harm.

Gramm-Leach-Biley Act (GLBA)

This act details the protections that must be in place when dealing with your private financial information.

Availability

You can get to the information you need at all times.

Identity theft

a criminal that gains access or control of your computer can steal all of this personal information. with the right data, username, and passwords, a criminal can pretend to be you.

Infected applications

applications running on your computer might become infected with viruses or other malware. the applications can then become unstable, quit working, completely, corrupt your data, or send private data out to others.

sensitive data

belong to customers such as credit cards numbers businesses need a way to keep this information safe and secure. nobody outside the company should be able to view sensitive records, and only authorized employees within the company should be able to access those records.


Ensembles d'études connexes

Chapter 51: Care of Patients with Musculoskeletal Trauma

View Set

CFP - Retirement Planning & Employee Benefits

View Set

art appreciation test 4- artists match the painting title

View Set

ІТХВ ПИТАННЯ ДО ІСПИТУ

View Set

Sociology Chapter 12, 13, and 16

View Set

Sociology Lesson 6- Sex and Gender

View Set