Module 6
cookie
A file created by a website and that stores information on your computer, such as your website preferences; also called a first-party cookie.
repetitive strain injury (RSI)
Aches and pains associated with repeated and long-term usage of the devices.
Ergonomics
An applied science that specifies the design and arrangement of items that you use so that you and the items interact efficiently and safely.
address spoofing
An attack that changes the device's address so that data is sent to the attacker's computer
attackers
An individual who launches attacks against other users and their computers, also known as a threat actor.
Hactivists
Attackers who are strongly motivated by principles or beliefs.
hoax
Definition: A false warning, often contained in an email message that pretends to come from a valid source like the company's IT department. Attackers use this method to break into computers.
two factor authentication (2FA)
Definition: A method that combines multiple types of authentication to increase security. This is most often used with passwords (something you know) and the approved user having a specific item in his possession (something you have) that no one else would have. This is commonly used by combining passwords and codes sent to a cell phone using a text message.
weak password
Definition: A password that is short in length (less than 15 characters),uses a common word (princess), a predictable sequence of characters (abc123), or personal information (Braden).
Term: password manager
Definition: A program that helps you create and store multiple strong passwords in single user "vault" file that is protected by one strong master password.
Term: Encryption
Definition: A security method of "scrambling" information as it is transmitted over a network. Information is scrambled in such a way that it cannot be read unless the user possesses the "key" to unlock it back to a readable format.
Term: biometric security
Definition: A way to verify your identity based on physical characteristics.
Wi-Fi
Definition: A wireless data network technology that provides high-speed data connections that do not require a physical connection. It is used for mobile devices.
Cyberterrorists
Definition: An individual who attacks a nation's computer networks, like the electrical power grid, to cause disruption and panic among citizens.
Script kiddies
Definition: An individual who wants to attack computers, but lacks the knowledge of computers and networks needed to do so. Script kiddies download freely available automated attack software (scripts) from websites and use it to perform malicious acts.
digital certificate
Definition: Code attached to a file that verifies the identity of the creator of the file.
Term: Phishing
Definition: In Computer Concepts, sending an email or displaying a web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into giving private information.
Malware
Definition: Malicious software, such as viruses and spyware, that can delete or corrupt files and gather personal information.
data mining
Definition: The process of sifting through big data to find the important questions that will yield fruitful results.
decryption
Definition: The process of unlocking encrypted information back into a readable format.
Term: wireless routers
Definition: This central connection device needed for a home-based Wi-Fi network. The wireless router acts as the "base station" for the wireless devices, sending and receiving wireless signals between all devices as well as providing the "gateway" to the external Internet.
Term: data backup
The process of copying files from a computer's hard drive to be stored in a remote location
insiders
The security threat to a company that comes from its own employees, contractors, and business partners
e-waste
Electronic waste from discarded digital devices. It often contains toxic metals such as lead and mercury.
Term: strong password
In Computer Concepts, a combination of letters, numbers, and/or symbols that unlocks access to protected electronic data that is a minimum of 15-20 characters in length
virus
In Computer Concepts, malicious computer code that reproduces itself on the same computer. Almost all viruses "infect" by inserting themselves into a computer file. When the file is opened, the virus is activated.
Trojan
Malware that hides inside another program, often one downloaded from the web.
worm
A collection of harmful computer code that spreads throughout a computer and/or network without requiring user interaction.
uninterruptible power supply (UPS)
A device that maintains power to computer equipment in case of an interruption in the primary electrical source.
surge protector
A device that protects computers and other electronic devices from power surges.
Social engineering
A category of attacks that attempts to trick the victim into giving valuable information to the attacker. At its core, social engineering relies on an attacker's clever manipulation of human nature in order to persuade the victim to provide information or take actions.
technology addiction
A behavioral hazard that occurs when a user is obsessed with using a technology device and cannot walk away from it without feeling extreme anxiety.
nation state actors
Government-sponsored attacker that launches computer attacks against their enemies.