Module 6

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

cookie

A file created by a website and that stores information on your computer, such as your website preferences; also called a first-party cookie.

repetitive strain injury (RSI)

Aches and pains associated with repeated and long-term usage of the devices.

Ergonomics

An applied science that specifies the design and arrangement of items that you use so that you and the items interact efficiently and safely.

address spoofing

An attack that changes the device's address so that data is sent to the attacker's computer

attackers

An individual who launches attacks against other users and their computers, also known as a threat actor.

Hactivists

Attackers who are strongly motivated by principles or beliefs.

hoax

Definition: A false warning, often contained in an email message that pretends to come from a valid source like the company's IT department. Attackers use this method to break into computers.

two factor authentication (2FA)

Definition: A method that combines multiple types of authentication to increase security. This is most often used with passwords (something you know) and the approved user having a specific item in his possession (something you have) that no one else would have. This is commonly used by combining passwords and codes sent to a cell phone using a text message.

weak password

Definition: A password that is short in length (less than 15 characters),uses a common word (princess), a predictable sequence of characters (abc123), or personal information (Braden).

Term: password manager

Definition: A program that helps you create and store multiple strong passwords in single user "vault" file that is protected by one strong master password.

Term: Encryption

Definition: A security method of "scrambling" information as it is transmitted over a network. Information is scrambled in such a way that it cannot be read unless the user possesses the "key" to unlock it back to a readable format.

Term: biometric security

Definition: A way to verify your identity based on physical characteristics.

Wi-Fi

Definition: A wireless data network technology that provides high-speed data connections that do not require a physical connection. It is used for mobile devices.

Cyberterrorists

Definition: An individual who attacks a nation's computer networks, like the electrical power grid, to cause disruption and panic among citizens.

Script kiddies

Definition: An individual who wants to attack computers, but lacks the knowledge of computers and networks needed to do so. Script kiddies download freely available automated attack software (scripts) from websites and use it to perform malicious acts.

digital certificate

Definition: Code attached to a file that verifies the identity of the creator of the file.

Term: Phishing

Definition: In Computer Concepts, sending an email or displaying a web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into giving private information.

Malware

Definition: Malicious software, such as viruses and spyware, that can delete or corrupt files and gather personal information.

data mining

Definition: The process of sifting through big data to find the important questions that will yield fruitful results.

decryption

Definition: The process of unlocking encrypted information back into a readable format.

Term: wireless routers

Definition: This central connection device needed for a home-based Wi-Fi network. The wireless router acts as the "base station" for the wireless devices, sending and receiving wireless signals between all devices as well as providing the "gateway" to the external Internet.

Term: data backup

The process of copying files from a computer's hard drive to be stored in a remote location

insiders

The security threat to a company that comes from its own employees, contractors, and business partners

e-waste

Electronic waste from discarded digital devices. It often contains toxic metals such as lead and mercury.

Term: strong password

In Computer Concepts, a combination of letters, numbers, and/or symbols that unlocks access to protected electronic data that is a minimum of 15-20 characters in length

virus

In Computer Concepts, malicious computer code that reproduces itself on the same computer. Almost all viruses "infect" by inserting themselves into a computer file. When the file is opened, the virus is activated.

Trojan

Malware that hides inside another program, often one downloaded from the web.

worm

A collection of harmful computer code that spreads throughout a computer and/or network without requiring user interaction.

uninterruptible power supply (UPS)

A device that maintains power to computer equipment in case of an interruption in the primary electrical source.

surge protector

A device that protects computers and other electronic devices from power surges.

Social engineering

A category of attacks that attempts to trick the victim into giving valuable information to the attacker. At its core, social engineering relies on an attacker's clever manipulation of human nature in order to persuade the victim to provide information or take actions.

technology addiction

A behavioral hazard that occurs when a user is obsessed with using a technology device and cannot walk away from it without feeling extreme anxiety.

nation state actors

Government-sponsored attacker that launches computer attacks against their enemies.


Set pelajaran terkait

Chapter 37 (Transport Operations)

View Set

Endocrine Disorders Practice Questions

View Set

Air Carrier Operations Chapter 1 quiz

View Set

ECON 182 Microeconomics - Chapter 10 & 11 -Chapter Readings

View Set

Fluid & Electrolyte Balance Application Exam

View Set

Unit 5 part 1- rotational kinematics—-rotational inertia

View Set

Intro to Business 1100- Module 2

View Set