Save
Introduction to Computing M3
m8
Save
Share
Learn
Content
Leaderboard
Share
Learn
Created by
Yujiro Hanma
Visit profile
Cards (76)
What is a computer security risk?
Action that causes
loss of
or
damage to
computer system.
View source
What is a virus?
A
potentially
damaging computer program.
View source
How does a worm differ from a virus?
A worm copies itself repeatedly, using up
resources
.
View source
What is a Trojan horse in computer security?
A program that hides within or looks like a
legitimate
program until triggered.
View source
What happens when a Trojan horse is triggered?
It delivers a
destructive
event when you open a file or run an
infected
program.
View source
How does a virus spread through an e-mail message?
Unscrupulous
programmers
hide a virus in a
Word
document attached to an e-mail.
View source
What should users do if they do not recognize the sender of an e-mail message?
They should delete the e-mail message to avoid
infection
.
View source
What does an antivirus program do to inoculate a program file?
It records information about the program and attempts to remove any detected virus.
View source
What is a virus signature?
A specific pattern of
virus code
also called a
virus definition
.
View source
What is the primary function of an antivirus program?
To identify and remove
computer viruses
.
View source
How can you protect your system from a macro virus?
Set macro security level
in
applications
that allow macros.
View source
What are some tips for preventing virus, worm, and Trojan horse infections?
Install a personal
firewall program
Delete
infected
e-mail attachments immediately
Set
macro security
in programs
Never open
unexpected
e-mail attachments
Install
antivirus programs
on all computers
Check downloaded programs for
viruses
View source
What is a denial of service attack?
An
assault
that disrupts computer access to an
Internet service
.
View source
What is a back door in computer security?
A program that allows users to bypass
security controls
.
View source
What is spoofing in network security?
Makes
a
network
transmission
appear
legitimate.
View source
What is IP spoofing?
When an
intruder
fools a network into believing its IP address is
trusted
.
View source
What is a firewall?
A
security
system that prevents
unauthorized
intrusion.
View source
What is a user name?
A
unique
combination of characters that identifies a user.
View source
What is hardware theft?
The act of stealing computer
equipment
.
View source
What is hardware vandalism?
The act of
defacing
or destroying computer
equipment
.
View source
What is a biometric device?
A device that authenticates a person's identity using
personal
characteristics.
View source
What is a personal firewall utility?
A program that protects a personal computer from
unauthorized
intrusions.
View source
What is software theft?
The act of
stealing
or
illegally
copying software.
View source
What is encryption?
The process of converting
plaintext
into
ciphertext
to safeguard information.
View source
What is a license agreement?
The right to use
software
under specified conditions.
View source
What is a certificate authority (CA)?
An authorized entity that issues and verifies
digital certificates
.
View source
What is Secure Sockets Layer (SSL)?
A protocol that provides
encryption
of data between client and server.
View source
What is a backup?
A
duplicate
of a file, program, or disk.
View source
What is a surge protector?
A device that protects computer equipment from
electrical
disturbances.
View source
What is computer ethics?
Moral
guidelines
that govern the use of computers and information systems.
View source
What is information privacy?
The right of
individuals
to deny or restrict the
collection
of their information.
View source
What is spyware?
A
program
placed on a computer without the user's knowledge.
View source
What is adware?
A program that displays
online
advertisements.
View source
What is spam?
An unsolicited
e-mail
message sent to many recipients.
View source
What is content filtering?
The process of restricting access to certain material on the
Internet
.
View source
What is computer forensics?
The
discovery
, collection, and analysis of
evidence
found on computers.
View source
What is phishing?
A scam that attempts to obtain
personal
and
financial
information.
View source
What are some health concerns of computer use?
Computer vision syndrome
,
repetitive strain injury
, and
carpal tunnel syndrome
.
View source
What is green computing?
Reducing
electricity
and environmental waste while using computers.
View source
What is a computer security risk?
An action that causes
loss of
or
damage
to a computer system
View source
See all 76 cards