Cards (76)

  • What is a computer security risk?
    Action that causes loss of or damage to computer system.
  • What is a virus?
    A potentially damaging computer program.
  • How does a worm differ from a virus?
    A worm copies itself repeatedly, using up resources.
  • What is a Trojan horse in computer security?
    A program that hides within or looks like a legitimate program until triggered.
  • What happens when a Trojan horse is triggered?
    It delivers a destructive event when you open a file or run an infected program.
  • How does a virus spread through an e-mail message?
    Unscrupulous programmers hide a virus in a Word document attached to an e-mail.
  • What should users do if they do not recognize the sender of an e-mail message?
    They should delete the e-mail message to avoid infection.
  • What does an antivirus program do to inoculate a program file?
    It records information about the program and attempts to remove any detected virus.
  • What is a virus signature?
    A specific pattern of virus code also called a virus definition.
  • What is the primary function of an antivirus program?
    To identify and remove computer viruses.
  • How can you protect your system from a macro virus?
    Set macro security level in applications that allow macros.
  • What are some tips for preventing virus, worm, and Trojan horse infections?
    • Install a personal firewall program
    • Delete infected e-mail attachments immediately
    • Set macro security in programs
    • Never open unexpected e-mail attachments
    • Install antivirus programs on all computers
    • Check downloaded programs for viruses
  • What is a denial of service attack?
    An assault that disrupts computer access to an Internet service.
  • What is a back door in computer security?
    A program that allows users to bypass security controls.
  • What is spoofing in network security?
    Makes a network transmission appear legitimate.
  • What is IP spoofing?
    When an intruder fools a network into believing its IP address is trusted.
  • What is a firewall?
    A security system that prevents unauthorized intrusion.
  • What is a user name?
    A unique combination of characters that identifies a user.
  • What is hardware theft?
    The act of stealing computer equipment.
  • What is hardware vandalism?
    The act of defacing or destroying computer equipment.
  • What is a biometric device?
    A device that authenticates a person's identity using personal characteristics.
  • What is a personal firewall utility?
    A program that protects a personal computer from unauthorized intrusions.
  • What is software theft?
    The act of stealing or illegally copying software.
  • What is encryption?
    The process of converting plaintext into ciphertext to safeguard information.
  • What is a license agreement?
    The right to use software under specified conditions.
  • What is a certificate authority (CA)?
    An authorized entity that issues and verifies digital certificates.
  • What is Secure Sockets Layer (SSL)?
    A protocol that provides encryption of data between client and server.
  • What is a backup?
    A duplicate of a file, program, or disk.
  • What is a surge protector?
    A device that protects computer equipment from electrical disturbances.
  • What is computer ethics?
    Moral guidelines that govern the use of computers and information systems.
  • What is information privacy?
    The right of individuals to deny or restrict the collection of their information.
  • What is spyware?
    A program placed on a computer without the user's knowledge.
  • What is adware?
    A program that displays online advertisements.
  • What is spam?
    An unsolicited e-mail message sent to many recipients.
  • What is content filtering?
    The process of restricting access to certain material on the Internet.
  • What is computer forensics?
    The discovery, collection, and analysis of evidence found on computers.
  • What is phishing?
    A scam that attempts to obtain personal and financial information.
  • What are some health concerns of computer use?
    Computer vision syndrome, repetitive strain injury, and carpal tunnel syndrome.
  • What is green computing?
    Reducing electricity and environmental waste while using computers.
  • What is a computer security risk?
    An action that causes loss of or damage to a computer system