Chapter 4 & 10 Terms

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

personally identifiable information (PII)

"information: (i) that directly identifies an individual (e.g., name, address, social security number or other identifying number or code, telephone number, email address, etc.) or (ii) by which an agency intends to identify specific individuals in conjunction with other data elements, i.e., indirect identification. (These data elements may include a combination of gender, race, birth date, geographic indicator, and other descriptors). Additionally, information permitting the physical or online contacting of a specific individual is the same as personally identifiable information."

Three-dimensional printers

(3D) A printer that can create objects such as prototypes and models. -digital image can be created by scanning an object or can be designed using computer software -creates the model by building layers of material such as paper, polymers, resin, metal, or even chocolate

Arithmetic logic unit

(ALU) The part of a processor (CPU) that performs arithmetic (addition and subtraction) and logic (AND, OR, and NOT) calculations.

Blu-ray disc

(BD) An optical disc that uses a violet laser to read and write data. The single-layer disc capacity is 25 GB, the double-layer disc capacity is 50 GB, and the triple-layer disc capacity is 100 GB. -enables information to be stored at a higher density than the red laser used in DVDs -single-layer disc capacity is 25 GB, the double-layer disc capacity is 50 GB, and the triple-layer capacity is 100 GB. Because of this larger storage capacity, Blu-ray is used for high-definition video and data storage

BIOS

(Basic Input/Output System) A program stored on a chip on a motherboard that is used to start up a computer. -tests and initializes the hardware and begins to load the operating system, also known as booting -BIOS is stored on flash memory -BIOS uses settings that are stored on the CMOS -On modern PCs, the BIOS has been replaced with the Unified Extensible Firmware Interface

Digital signal processor

(DSP) A specialized chip that performs calculations on digitized analog signals such as sound, video, images, temperature, pressure, or position. -used by smartphones to perform specific tasks, such as image handling and speech recognition -Taking these tasks off the CPU can improve overall smartphone performance. -Health and fitness trackers use DSPs to track motion, and to measure heartrate and temperature. DSPs have applications in RADAR, seismology, and SONAR systems.

EIDE

(Enhanced Integrated Drive Electronics) A legacy drive interface found on the motherboards of older personal computers. -replaced by SATA

Floating-point operations per second

(FLOPS) A measurement of computer performance typically used to describe supercomputers. -The fastest supercomputers are measured in petaflops -type of mathematical calculation required in scientific research and high-performance systems.

Gigahertz

(GHz) A measure of the speed at which a processor executes the information cycle. 1 GHz is equal to 1 billion cycles per second.

Graphics-processing unit

(GPU) A processor found on a video card.

Graphic-processing unit

(GPU) A processor found on a video card. -can contain multiple cores -reduces the processing required of the system CPU for graphics-intensive processes -improve system performance is to move some processing tasks from the CPU -specialized to perform complex mathematical computations required to render 2D and 3D video -video and photo editing programs - other applications are found in AI and self-driving technologies

HDMI

(High-Definition Multimedia Interface) A digital port that can transmit both audio and video signals. It is the standard connection for high-definition TVs, video game consoles, and other media devices.

Near field communication

(NFC) A technology that enables devices to share data with each other by touching them together or bringing them within a few centimeters of each other. -Interaction is possible between two NFC-enabled devices or between an NFC device and an NFC tag

Network interface card

(NIC) A communication device used to establish a connection with a network. The adapter may be onboard, an expansion card, or a USB device and may be wired or wireless. Also called a network adapter.

PCIe

(PCI Express) A faster version of PCI used to connect peripheral devices to a computer. -The most recent standard is PCIe 6.0, which doubles the bandwidth of the previous version

PCI

(Peripheral Component Interconnect) A legacy type of expansion slot on a motherboard used to connect peripheral devices to a computer. -replaced by PCIe because it is faster and newer

Quick response codes

(QR) A two-dimensional bar code found in ads and on merchandise tags that can be scanned using an app on a mobile device to learn more about the item.

Random access memory

(RAM) A volatile form of memory that holds the operating system, programs, and data the computer is currently using. -You can think of it as your workspace -A computer that doesn't have enough RAM is slow and difficult to use -volatile, and any unsaved work is lost when you close a program or turn off your computer

Read-only memory

(ROM) A nonvolatile form of memory that does not need power to retain data. -The BIOS chip is read-only memory

Solid-state drive

(SSD) A small drive that uses flash memory to store data. -fast, quiet, and sturdy -used in small electronic devices, such as media players, as well as in notebooks and desktops -can use the same controllers as hard drives, or controllers designed for SSDs, and can be either internal or external -more expensive than similar-capacity hard drives, they are used primarily where speed and durability are necessary -standard in notebook computers because they are small, fast, and light

SATA

(Serial Advanced Technology Attachment) The standard internal drive interface. -has replaced the legacy EIDE (Enhanced Integrated Drive Electronics) interface -up to three times faster than EIDE was and has smaller, thinner cables that take up less room and enable better airflow inside the system unit

Unified Extensible Firmware Interface

(UEFI) A specification that defines how software and hardware interact in a system, used to boot and configure a computer. -replaced BIOS on most computers -can be stored on a chip on the motherboard or be loaded from a hard disk or network.

Universal Serial Bus

(USB) A standard port type that is used to connect many kinds of devices, including printers, mice, keyboards, digital cameras, cell phones, and external drives. Up to 127 devices can share a single USB port. -also provides power to some devices, which allows this type of connection to charge a media player or smartphone and power devices such as webcams -Another advantage of USB devices is that they are hot-swappable

CD

(compact disc) The oldest type of optical disc in use today, with a storage capacity of about 700 MB. -used to distribute software and music and to store photos and data, but they have been replaced by larger-capacity DVDs to distribute movies and some software

CMOS

(complementary metal oxide semiconductor) A volatile form of memory that uses a small battery to provide it with power to keep the data in memory even when the computer is turned off. It stores settings that are used by the BIOS. -

DLP projectors

(digital light-processing) A projector that uses hundreds of thousands of tiny swiveling mirrors to create an image. -produce high-contrast images with deep blacks but are limited by having weaker reds and yellows -most portable projectors on the market today are DLP projectors, which weigh less than three pounds. DLPs also are very popular home theater projectors because of the higher contrast and deeper blacks that they produce

DVD

(digital video disc/digital versatile disc) An optical disc that can hold more information than a CD. A single-layer (SL) DVD can hold about 4.7 GB of information. A double-layer (DL) DVD has a second layer to store data and can hold about 8.5 GB. -used to distribute movies and larger software programs.

DVI

(digital visual interface) An older, digital video standard that was designed to replace VGA. -DVI port provides a digital connection for flat panel displays, data projectors, TVs, and DVD players -replaced by DisplayPort

Denial-of-service attack

(dos) perpetrated by sending out so much traffic that it cripples a server or network -an attack that sends out so much traffic that it could cripple a server

LCD

(liquid crystal display) A flat-panel display type found on most desktop and notebook computers that consists of two layers of glass glued together with a layer of liquid crystals between them. When electricity is passed through the individual crystals, it causes them to pass or block light to create an image. -do not give off any light, so they need to be backlit by a light source, either CCFLs (cold cathode fluorescent lamps) or LEDs.

OLED

(organic light-emitting diode) A monitor composed of extremely thin panels of organic molecules sandwiched between two electrodes. -can be very thin and even bendable -more energy-efficient than LCDs, but OLED monitors cost significantly more than LCDs

RFID tag

(radio-frequency identification) A tag that can be read by an RFID (radio-frequency identification) scanner. It contains a tiny antenna for receiving and sending a radio-frequency signal. -used in inventory tracking, electronic toll collection, and passports

VGA

(video graphics array) A legacy, analog video standard.

Bot

(zombie) computer infected by malware and is part of a botnet under the control of a master -can be used to launch a malicious attack

Darknet market

A black market located on the dark web that can be accessed anonymously to purchase illegal items -such as Silk Road (2011-2013), AlphaBay (2014-2017, relaunched in 2021), and White House Market (2019-2021), have an interface that looks like any web store you might find on the surface web. -Items can only be purchased using cryptocurrency to increase anonymity

Expansion cards

A card that plugs directly into an expansion slot on a motherboard and enables you to connect additional peripheral devices to a computer. Also called an adapter card. -Video cards, sound cards, and network cards -Most expansion cards plug into a PCIe

Adapter cards

A card that plugs directly into an expansion slot on a motherboard and enables you to connect additional peripheral devices to a computer. Also called an expansion card. -Video cards, sound cards, and network cards are common expansion cards -Most expansion cards plug into a PCIe

Browser hijacker

A common type of spyware infection -changes your home page and redirects you to other websites

Modem

A communication device that modulates digital data into an analog signal that can be transmitted over a phone line and, on the receiving end, demodulates the analog signal back into digital data. -short for modulator-demodulator -connects a computer to a telephone line and is most often used for dial-up Internet access -Traditional analog modems have primarily been replaced with newer, faster ways to connect to the Internet

Network adapter

A communication device used to establish a connection with a network. The adapter may be onboard, an expansion card, or a USB device and may be wired or wireless. Also called a network interface card (NIC).

Drive controller

A component located on the motherboard that provides a drive interface, which connects disk drives to the processor.

Ports

A connection point that is used to attach a peripheral device to a motherboard. -The most common types of available ports are USB and Thunderbolt -Various ports on a motherboard are color-coded -Other ports commonly found on a computer include Ethernet ports to connect to a network, audio ports for speakers and microphones, and video ports to connect monitors and projectors. These are covered in more detail later in this chapter.

Hot-swappable

A device that can be plugged in and unplugged without turning off the computer. -advantage of USB devices

Output Device

A device that returns processed information to the user.

Output devices

A device that returns processed information to the user. -Computer output comes in two forms: tangible and intangible -Video and audio output are intangible outputs and have changed computers from simply being calculators of data to being an integral part of education and entertainment experiences.

Communication devices

A device that serves as both an input and output device and enables you to connect to other devices on a network or to the Internet. -

Input device

A device used to enter data into a computer system. -type of input device you use depends on many factors, including the type of data to be input, the type of computer the input device is connected to, and the application you are using

DisplayPort

A digital video standard designed to replace DVI and VGA. -sometimes implemented in the Mini DisplayPort format, which is ideal for smaller notebook bodies. A video card may also include input ports to connect a TV tuner or another video device to the system

Optical discs

A form of removable storage where data is stored by using a laser to either melt the disc material or change the color of embedded dye. A laser reads the variations as binary data. -mounted in the system unit in an external drive bay, which enables you to access the drive to insert or eject discs -can also be peripheral devices connected by USB or Thunderbolt. Optical discs can take several forms: read-only (ROM), recordable or rewritable

CRT monitors

A legacy display technology that uses a cathode ray tube to excite phosphor particles coating a glass screen to light up the pixels.

CRT Monitors

A legacy display technology that uses a cathode ray tube to excite phosphor particles coating a glass screen to light up the pixels. -big and use a lot of energy and have been replaced by smaller and more energy-efficient flat-panel monitors -legacy technology—old technology used alongside its more modern replacement because it still works and is cost-effective

Pipelining

A method used by a single processor to process multiple instructions simultaneously. As soon as the first instruction has moved from the fetch stage to the decode stage, the processor fetches the next instruction. -to improve performance

Chatbot

A new method of phishing attack links to a fake customer support -predefined questions to ask to steal the victim's credentials

Flash memory

A nonvolatile form of memory that can be electrically erased and programmed. -Unlike optical and magnetic storage, flash memory is non-mechanical -resistant to shock and very durable, making it ideal for mobile device -used in solid-state drives, flash drives, and memory cards

Heat sink

A part of the cooling system of a computer, mounted above the CPU and composed of metal or ceramic to draw heat away from the processor. -installed above the processor dissipate the heat the processor produces -keep a processor from overheating

Thunderbolt

A port that carries both PCIe and DisplayPort video signals on the same cable, so it can be used to connect many different types of peripherals to a computer. -has been standard on most Mac computers and is now commonly found on Windows computers too -can connect multiple devices using one Thunderbolt connection -current standard is Thunderbolt 4, which transfers data at speeds up to 40 Gbps

Photo printer

A printer designed to print high-quality photos on special photo paper. Photo printers can be inkjet printers or dye-sublimation printers. -Some photo printers connect directly to a digital camera or read data from a memory card. Many newer cameras and cell phones connect to printers through Wi-Fi or Bluetooth

Multifunction devices

A printer device with a built-in scanner and sometimes fax capabilities. Also known as an all-in-one printer. -disadvantage of using an all-in-one device is that if it needs to be repaired, all of its functions are unavailable.

Thermal printers

A printer that creates an image by heating specially coated heat-sensitive paper, which changes color where the heat is applied. -print the receipts you receive from gas pumps, ATMs, and many cash registers -can print in one or two colors and are used to print receipts, bar codes, postage, and labels

Inkjet printers

A printer that sprays droplets of ink onto paper. -Some printers use one ink cartridge; others may use two, three, four, or even more

Laser printer

A printer that uses a laser beam to draw an image on a drum. The image is electrostatically charged and attracts a dry ink called toner. The drum is then rolled over paper, and the toner is deposited on the paper. Finally, the paper is heated and pressure is applied, bonding the ink to the paper. -produce the sharpest text at a lower cost per page than inkjet printers. -Although they initially cost more than inkjets, the lower cost per page makes them less expensive for high-volume printing

Dye-sublimation printers

A printer that uses heat to turn solid dye into a gas that is then transferred to special paper. -comes on a three- or four-color ribbon that prints a single color at a time. After all colors have been printed, the print is then coated with a transparent protective layer to produce high-quality photos that last longer than those printed on an inkjet printer -limited to printing photos and some specialty items, such as ID badges and medical scans.

Plotters

A printer that uses one or more pens to draw an image on a roll of paper. -produce very large printouts, such as blueprints, posters, and maps -Large inkjet and laser printers have mostly replaced pen plotters

Multi-core processor

A processor that consists of two or more processors integrated on a single chip. -increases the processing speed over single-core processors and reduces energy consumption over multiple separate processors -dual-core and quad-core processors are found on most personal computers, with six- and eight-core processors on higher-end machines

LCD projectors

A projector that passes light through a prism, which divides the light into three beams—red, green, and blue—which are then passed through an LCD screen. -display more vibrant colors but produce poorer contrast and washed-out blacks. LCDs tend to have sharper images than DLPs and are better in bright rooms -ideal for presentations in conferences and classrooms.

Biometric scanners

A scanner that measures human characteristics such as fingerprints and eye retinas. -Used in banks to identify patrons, in theme parks to ensure that tickets are not transferred to other guests, and in corporate security systems -Some notebook computers and smartphones use a fingerprint scanner to authenticate a user

Keypad

A small alternative keyboard that has a limited set of keys. -type of input device is found in point-of-sale (POS) terminals

Flash Drives

A small, portable, solid-state drive with a USB interface. -used as internal storage in tablets and mobile devices

Webcams

A specialized video camera that provides visual input for online communication, such as web conferencing or chatting.

Memory cards

A storage medium that uses flash memory to store data.

Memory Cards

A storage medium that uses flash memory to store data. -most common formats include Secure Digital (SD), microSD and miniSD, CompactFlash (CF), CFexpress, XQD, and CFast -Card readers transfer data, such as photos and music, between a card and a computer or printer. Personal computers and photo printers may have built-in card readers, or you can use USB card readers on computers that don't have them

Bluetooth

A technology that connects peripherals wirelessly at short range. -commonly used to connect mice, keyboards, and printers to personal computers

Monitors

A video output device that works by lighting up pixels on a screen. Each pixel contains three colors—red, green, and blue (RGB)—and all colors can be created by varying the intensities of these three colors. -The size of a monitor is measured diagonally across the screen

Projectors

A video output device typically used when making a presentation or sharing media with a group in such places as classrooms, businesses, and home theaters because they can produce larger output than a monitor.

Hyper-threading

A virtual form of parallel processing, used in processors built by Intel, which enables a single CPU to appear as two logical processors.

Data buses

A wire on a motherboard over which information flows between the components of a computer. -Local buses connect the internal devices on the motherboard -external buses connect the peripheral devices to the CPU and memory of the computer -The speed of the data bus is an important factor in the performance of a system

Bitcoin

An anonymous, digital, encrypted currency that you can buy or mine -uses GPU for mining -must allow your system to become part of the coin network and function to validate transactions

Zero-day exploit

An attack that occurs on the day an exploit is discovered, before the publisher of the compromised software can fix it

Sound card

An expansion card that provides audio connections for both audio input devices and output devices.

Sound Card

An expansion card that provides audio connections for both audio input devices and output devices. -can be integrated into the motherboard—onboard—or connected through expansion cards -High-end sound cards support surround sound, have connections for up to eight speakers, and include a digital optical port for connecting to a home entertainment system.

Video card

An expansion card that provides the data signal and connection for a monitor or projector. It may also include input ports to connect a TV tuner or another video device to the system. -also called graphic accelerator or display adapter -provides the data signal and connection for a monitor or projector -Modern video cards contain their own memory, known as VRAM (video RAM), and a graphics-processing unit (GPU) to produce the best and fastest images

Joystick

An input device mounted on a base that consists of a stick, buttons, and sometimes a trigger. -consists of a stick, buttons, and sometimes a trigger mounted on a base -may be used to control machinery

Touchscreens

An input device that can accept input from a finger or a stylus. -Resistive touchscreens sense pressure used with a finger or an ordinary stylus. A capacitive screen senses the conductive properties of an object, such as your finger or a specially designed conductive stylus

Scanners

An input device that can increase the speed and accuracy of data entry and convert information into a digital format that can be saved, copied, and manipulated. -have many uses, from archiving old documents to organizing libraries to assisting law enforcement

Microphones

An input device that converts sound into digital signals and is used to chat in real time or as part of voice-recognition applications used in video games and for dictating text. -may be integrated into notebook computers and headsets or can be connected via USB or to the microphone port on a sound card

Mouse

An input device that may include one or more buttons and a scroll wheel that works by moving across a smooth surface to signal movement of the pointer.

Keyboard

An input device that translates keystrokes into a signal a computer understands; the primary input device for entering text into a computer. -translates keystrokes into a signal a computer understands

Touchpad

An input device typically found on a notebook computer instead of a mouse. You move a finger across the touch-sensitive surface, and the computer detects and translates your motion. -software can enable gestures, such as a pinch to zoom in or tapping with two fingers to open a shortcut menu

Expansion Slots

An interface on a motherboard that expansion cards plug into.

Speakers

An output device that converts digital signals from a computer or media player into sound. -may be integrated into notebook computers or monitors, connected via USB or Bluetooth, or plugged into the speaker ports on a sound card

Cyberterrorism

An unlawful attack on computers or networks done to intimidate a government or its people for a political or social agenda -Though most cyberterrorism attacks are unsuccessful and unreported, experts agree the threat is growing

Dark web

At the bottom of the deep web -a subset of the deep web that is only accessible using the Tor browser to view it anonymously and securely -encrypted and hidden -The dark web consists of many types of websites—legal and illegal—that use the .onion top-level domain (TLD) -sell drugs, guns, cyber weapons, and data. -But not all uses of the dark web are illegal. Some users take advantage of the anonymity and security of the dark web—for example, journalists receiving information from whistleblowers and activists communicating in countries with restricted free speech

Peripheral devices

Components that serve the input, output, and storage functions of a computer system. -can be external devices or integrated into the system unit -

Ciphertext

Encryption converts unencrypted, plain text into code

Cache memory

Fast memory that stores frequently accessed information close to the processor. -Most computers have a smaller amount of high-speed cache memory -location close to the processor dramatically reduces the time it takes to access data and improves processor performance -Level 1 (L1) cache is built into the processor -Level 2 (L2) cache is on a separate chip and takes slightly longer to access -Modern processors may have L2 cache built in and a Level 3 (L3) cache on the motherboard -Each progressive level of cache is farther from the CPU and takes longer to access.

Clear web

It is estimated that only about 4 to 5 percent of the web is indexed and searchable by this search engines -also called surface web

Legacy technology

Old technology that's still used alongside its more modern replacement because it works and is cost-effective.

Headphones

Output devices that convert digital signals into sound. They come in several different sizes and styles, ranging from tiny earbuds that fit inside your ear to full-size headphones that completely cover your outer ear.

Processor

Short for central processing unit (CPU). The brain of a computer housed inside the system unit on the motherboard. It consists of two parts: the arithmetic logic unit and the control unit. -three main functions: performing calculations (ALU), executing program instructions, and making decisions (control unit).

Pixels

Short for picture element. A single point on a display screen. Each pixel contains three colors: red, green, and blue (RGB). -All colors are created by varying the intensities of the three colors -Display resolution indicates the number of horizontal pixels by vertical pixel

Adaptive technology

Software and hardware used by individuals with disabilities to interact with technology. Also called assistive technology. -In many cases, standard input and output devices can be adapted to the user. -For example, a monitor screen image can be enlarged for a user with visual impairments, and a user with hearing impairments might have lights flash when an audio signal sounds

Memory

Temporary storage that a computer uses to hold instructions and data. -sometimes referred to as primary storage -can be volatile or nonvolatile -Volatile memory requires power—any information left in memory is lost when the power is turned off -Nonvolatile memory does not need power to keep its data

System Unit

The case that encloses and protects the power supply, motherboard, CPU, and memory of a computer. -Inside the system unit is the main circuit board of a computer (the motherboard)

Motherboard

The main circuit board of a computer, which houses the processor (CPU) and contains drive controllers and interfaces, expansion slots, data buses, ports and connectors, the BIOS, and memory. It provides a way for devices to attach to the computer.

Resolution

The number of horizontal by vertical pixels—for example, 1280×1024 or 1920×1080—on a display screen. -The higher the resolution, the sharper the image. The size of a monitor is measured diagonally across the screen

Control Unit

The part of the processor that manages the movement of data through the CPU. -makes decisions in CPU

Hardware

The physical components of a computer.

Hard drive

The primary mass-storage device in a computer that stores data magnetically on metal platters. Also called a hard disk or hard disk drive. -form of nonvolatile storage; when the computer is powered off, the data is not lost -holds the operating system, programs, and data files -measured in hundreds of gigabytes or terabytes and can hold hundreds of thousands of files -store data magnetically on metal platters. The platters are stacked and read/write heads move across the surface of the platters, reading data, and writing it to memory -drives spin at up to 15,000 revolutions per minute, allowing for very fast data transfer -internal or external. Internal drives are located inside the system unit in an internal drive bay and are not accessible from the outside. An external drive attaches as a peripheral device using a USB or Thunderbolt connection -advantages of external drives are that they connect without opening the system unit and can be easily moved to another computer

Booting

The process of loading the operating system when starting up a computer. -tested and initialized by BIOS

Parallel processing

The process of using multiple processors or multi-core processors to divide up processing tasks. -distributes processing across multiple processors (including GPUs and DSPs) or multi-core processors -increases computer performance when running processor-intensive programs or when running multiple programs at the same time -most effective when software developers write programs that can take advantage of multiple processors

Clock speed

The speed at which a processor executes the instruction cycle. -Personal computer performance is measured in gigahertz (GHz) -Modern supercomputer speeds are measured in floating-point operations per second (FLOPS) -The fastest supercomputers are measured in petaflops

CMYK

The standard ink colors used by printers: cyan, magenta, yellow, and key (black). -Printers mix these colors to form every color

Instruction cycle

The steps a CPU uses to process data: fetch, decode, execute, store. Also known as the fetch-and-execute cycle or the machine cycle. -Fetch: An instruction is retrieved from the main memory. -Decode: The control unit translates the instruction into a computer command. -Execute: The ALU processes the command. -Store: The results are written back to memory (stored).

Overclock

To run a processor at speeds higher than it was designed to perform. -improve processor performance

Keylogger

a computer program that captures information a user enters on a keyboard -gathers information when a user enters usernames and passwords or credit card numbers -Some install on their computers to monitor the activity of other users. -There are also hardware—USB devices that plug in between the keyboard and computer. They are small and inconspicuous and can't be detected by security software. -backdoor can give the attacker access to the system, allowing them to monitor system activity, steal information, control hardware such as cameras, or plant malicious code.

Spyware

a form of malware that secretly gathers personal information about you. -The information is sent to a third party that may use it for anything from targeted advertisements to identity theft. -Spyware is usually installed inadvertently by a user who clicks on a pop-up or installs a freeware program that includes a tracking feature -example: hijacking

Click bait

a link that teases you with just enough information to get you to click the link, driving traffic to a webpage

Botnet

a network of infected computer zombies, or bots, that are controlled by a master or bot-herder -can be used to launch a malicious attack. -A botnet could be used to send out spam and viruses or to launch a denial-of-service attack (Dos), which is perpetrated by sending out so much traffic that it cripples a server or network

Trojan Horse

a program that appears to be a legitimate program but is instead something malicious. -A Trojan might install adware, a toolbar, or a keylogger program, or it might open a backdoor to allow remote access to the system. -A famous example of a Trojan is the Sinowal Trojan horse, which criminals used to steal more than 500,000 banking passwords and credit card numbers over three years

Virus

a program that replicates itself and infects computers. A virus needs a host file to travel on, such as a game -might use the email program on an infected computer to send out copies of itself and infect other machines

multi-factor authentication

account security measure that requires multiple methods of identification to sign in -can include something the user knows—such as a password, something the user has—such as a mobile device or authentication app, and something the user is—biometric data.

Hotfix (Patch)

addresses individual problems as they are discovered. -A service pack is a larger, planned update that addresses multiple problems or adds multiple features. Previous patches and hotfixes are included in a service pack

Wireless encryption

adds security to a wireless network by encrypting transmitted data. -Use the strongest form that's supported by the devices and operating systems on your network

Payload

an action or attack by a computer virus or other malware -may corrupt or delete files, or it may erase an entire disk

Logic bomb

attacks when certain conditions are met, such as when an employee's name is removed from a database -behaves like a virus in that it performs a malicious act, such as deleting files, but unlike a virus, it doesn't spread to other machines -When the trigger is a specific date and time, such as April Fools' Day or Friday the 13th, a logic bomb may be called a time bomb. -A virus may have logic bomb characteristics and can lay dormant on a system until certain conditions are met

Web tracking

collects, stores, and analyzes your activity across websites. It helps businesses build a profile about you, to target ads, improve user experiences, keep you logged in, remember your preferences, and save your shopping cart, just to name a few. -So, tracking can be a good thing. But there are times and places when you might prefer not to be tracked. -You do have some control. iOS apps ask you to turn on tracking, requiring you to opt in. In Chrome, open an Incognito window from the Customize Chrome menu of the browser window. In Firefox, Private Browsing lets you browse in a Private Window, and automatically clears your search and browsing history when you close private browsing. You can manually clear cookies, saved passwords, and browsing history in most browsers.

Encryption

converts unencrypted, plain text into code called ciphertext -File and drive encryption secure the data in your files. Windows includes Encrypting File System (EFS)

Computer fraud

convince a victim to voluntarily and knowingly give money or property to another person -Some of the most well-known computer fraud schemes on the Internet involve email messages claiming that you have won a lottery or inherited money

Cybercrime

criminal activity on the Internet. -Most of the crimes perpetrated online existed in some form long before computers came along, but technology has made them easier to commit and more widespread. -Personal cybercrime is perpetrated against individuals rather than businesses and other organizations. These are crimes that affect you directly and range from harassment to identity theft -Auction fraud is a common type of cybercrime that occurs when you purchase something from an online auction site. This can take many forms, including non-delivery of the item, bait-and-switch, excessive fees, counterfeit goods, and shill bidding

Cyber-harassment

cyber bullying between adults -Harassers use email, text messages, IMs, and social networks to embarrass, threaten, or torment someone—often because of their gender, race, religion, nationality, or sexual orientation

Shill bidding

fake bidding by the seller or an accomplice to drive up the price of an auction item. -Shopping on sites such as Amazon or eBay, which have seller rating systems, can help prevent auction fraud

Bug

flaws in the programming

Hacktivism

hacking to make a political statement (Anonymous & Shadow Brokers)

Drive-by download

happens when you visit a website that installs a program in the background without your knowledge

Firewall

hardware device that blocks unauthorized access to your network. -A software firewall—such as the one that comes with Windows—also blocks access to an individual machine. It's a good idea to use both forms to protect your systems. -A software firewall blocks connections to programs that aren't on an allowed list of programs. The first time a new program tries to access the network, the software firewall asks you whether to allow or block access. In this way, the firewall program learns which programs should be allowed access and denies access to any unauthorized programs

Clickjacking

in which clicking on a link allows malware to post unwanted links on your page

Worm

like a virus, is self-replicating, but it doesn't need a host to travel. -travel over networks, including the Internet. Once a system on a network is infected, it scans the network for other vulnerable machines to infect and spreads over the network connections without any human intervention

Catfishing

lures someone into a relationship by means of a fake online profile

Ransomware

malware that prevents you from using your computer until you pay a fine or fee. -In lock screen ransomware, a fake security violation that may appear to be from a law enforcement agency locks your computer screen. The lock screen message claims that your computer has been locked because of illegal activity or that it has been hijacked and that you must pay a fine to unlock your system. -Encryption ransomware encrypts files on your system and requires you to pay a fee to get the decryption key. Payments are made using cryptocurrency, such as bitcoin—an anonymous, digital, encrypted currency. -Fake antivirus warnings are another form of ransomware

Cyber-stalking

more severe, with the stalker demonstrating a pattern of harassment that poses a credible threat of harm

Data breach

occurs when sensitive data is stolen or viewed by someone who is not authorized to do so. -including those at Target, Home Depot, Dropbox, and iCloud, have exposed the personal information of millions of accounts. -In just the first quarter of 2022, over 400 data breaches were reported by the Identity Theft Resource Center (idtheftcenter.org), with an estimated 20 million victims

Identity theft (not a joke)

occurs when someone fraudulently uses your name, Social Security number, or bank or credit card number -The thief may purchase items, open new accounts, or commit a crime using your identity. Victims of identity theft can spend several years and thousands of dollars cleaning up the mess -If you decide to purchase identity theft protection, you should compare products and services carefully and be sure that you're getting services that are right for you. Also, check with your homeowners or renters insurance for available coverage

Security Suite

packages of security software that include a combination of features such as antivirus, firewall, and privacy protection. -The advantage of using a suite is that you get complete protection -the downsides are that they can be expensive and may use a lot of system resources. The chief complaint many people have is that they decrease system performance

acceptable use policy (AUP)

policy that computer and network users must abide by that forces users to practice safe computing -Although you might find them restrictive and annoying, from a business perspective, AUPs force users to practice safe computing and prevent a lot of potential problems from affecting the systems. The restrictions of an AUP depend on the type of business and the type of information you need access to -In most business environments, the AUP would likely prohibit all personal use of systems, including checking email, shopping online, using social networks, and playing online games. Other restrictions include illegal activities, personal business not related to the employer, and streaming video

Antispyware Software

prevents adware and spyware software from installing itself on your computer and can be used to clean an infected machine. -Some good stand-alone—and free—antispyware programs for personal use include Ad-Aware, Spybot, and Malwarebytes Anti-Malware

Antivirus program

protect against more than just viruses; they also protect against threats such as Trojans, worms, and spyware. -To search for known malware, antivirus programs use signature checking—scanning files on your computer, looking for items found in a virus definition file

Internet Crime Complaint Center (IC3)

provides a website—ic3.gov—where you can file a report. The IC3 will then process your complaint and forward it to the appropriate agency. The IC3 website has valuable information about cybersecurity and how to protect yourself

Pharming

redirects you to a phony website by hijacking the domain name of a company or poisoning the DNS server references to a site, which is like having the wrong phone number listed in the phonebook -effective because their messages appear to be from legitimate sources

Cyberbullying

refers to exchanges between minors -Harassers use email, text messages, IMs, and social networks to embarrass, threaten, or torment someone—often because of their gender, race, religion, nationality, or sexual orientation. Unlike traditional schoolyard bullying, cyberbullying follows a child beyond the schoolyard and the school day

Wi-Fi Protected Setup (WPS)

set up a secure wireless home network -allows you to push a button, enter a personal identification number (PIN), or insert a USB key to automatically configure devices to connect to your network. -Using this method, you don't need to know the network name (SSID) and wireless security passphrases

Network address translation (NAT)

shield the devices on a private network from the public network. -The router connects you to the public network—the Internet—and has a public IP address that it uses to communicate with the network; but inside your house, the router supplies each device with a private IP address that's valid only on your private network. -To the outside world, only the router is visible, so it shields the rest of your devices.

Malware

short for malicious software—includes many different types of programs that are designed to be harmful. -Protecting your computer from malware can be a difficult task

Adware

shows you ads—usually in the form of pop-ups or banner ads on websites or in software. -can use CPU cycles and Internet bandwidth and, as a result, significantly reduce your computer's performance -annoying forms of malware you can get on your computer

Cookie

small text file -helps the website identify you when you return. Whenever you visit a site and select Remember me or keep me logged in, you agree to allow the website to put a cookie on your computer. -Your personal information, such as your credit card number, isn't stored in the cookie. These cookies can personalize the website, making for a better customer experience. When you return to shop again, the site recognizes you because there's a cookie on your computer -The default settings in browsers block potentially malicious cookies, so these are considered safe. These ad-based cookies are used to track the websites and pages you visit to better target the ads you see.

Paywall

systems that require you to pay for access to content. -Most of this content is perfectly legal, just hidden from indexers, such as medical and financial records, database content, and legal documents

Hacking

the act of gaining unauthorized access to a computer system or network -be categorized as white hat, gray hat, or black hat, depending on their motivation and the results of their hacking. -White hat hackers' motivation is to find security holes in a system to prevent future hacking. They are security experts paid to hack systems (ethical hackers or sneakers) -Black hat hackers hack into systems for malicious purposes, such as theft or vandalism (crackers) -Gray hat hacker might break into a system to prove that he or she can or to expose a system's vulnerability. Although it's possible to hack into an individual's computer, the more valuable targets are large companies and government agencies

Deep web

the portion of the web that is not indexable by search engines -Much of the deep web is content that is hidden behind logins, corporate firewalls, or paywalls—systems that require you to pay for access to content. -Most of this content is perfectly legal, just hidden from indexers, such as medical and financial records, database content, and legal documents. -At the bottom of the deep web is the dark web -95-96% of the web

Distributed denial-of-service attack

uses botnets to distribute the attack traffic across hundreds of thousands, or even millions, of infected machines -DDos attacks have taken down many major websites, including Google, Twitter, CNN, eBay, and Amazon

Phishing

uses email, IMs, text message (smishing), or voice calls (vishing), that appear to be from those you do business with, such as Amazon, your bank, social network, auction site, online payment processor, or IT administrator. -Phishing messages use scare tactics, such as threatening the loss of access to your account, or the promise of reward to trick you into revealing personal information, such as usernames and passwords for your accounts -commonly uses chatboxes

Sharebaiting

when users share posts, often without clicking them first, which can fool you into believing the links are safe

User Account Control (UAC)

will notify you before changes are made to your computer. Though this may seem like a nuisance -it prevents malware from making changes to your system without your knowledge. -important to always read the message in the UAC box before allowing the change. Some malware infects computers by tricking users into responding to fake Windows notification boxes


Set pelajaran terkait

Chapter 1: Slides introduction to Python

View Set

Direct and Inverse Variation, Slope

View Set

VF20ab Manuals: Grand MA3 on PC, VF20a JB Lighting Sparx 10, Panasonic PTZ AW-UE150 4K, VF20b GrandMA 3, VF20a: Avid Venue S6L

View Set

Series 6: US Government, Municipal, Money Market Securities

View Set

TLB - Maslow, The Nursing Process, Collecting Data, NANDA, Care Plan,

View Set

Intro to Corporate Accounting - Capital Structure - Exam 1

View Set

direct and digital marketing midterm :(

View Set

Chapter 10: Monopolistic Competition and Oligopoly

View Set

Scientific Method, Theory, Hypothesis

View Set

EAQ Ch 58 Care of Patients with Liver Problems

View Set

Introduction to Communication Concepts

View Set