Cards (76)

    • What is a computer security risk?
      Action that causes loss of or damage to computer system.
    • What is a virus?
      A potentially damaging computer program.
    • How does a worm differ from a virus?
      A worm copies itself repeatedly, using up resources.
    • What is a Trojan horse in computer security?
      A program that hides within or looks like a legitimate program until triggered.
    • What happens when a Trojan horse is triggered?
      It delivers a destructive event when you open a file or run an infected program.
    • How does a virus spread through an e-mail message?
      Unscrupulous programmers hide a virus in a Word document attached to an e-mail.
    • What should users do if they do not recognize the sender of an e-mail message?
      They should delete the e-mail message to avoid infection.
    • What does an antivirus program do to inoculate a program file?
      It records information about the program and attempts to remove any detected virus.
    • What is a virus signature?
      A specific pattern of virus code also called a virus definition.
    • What is the primary function of an antivirus program?
      To identify and remove computer viruses.
    • How can you protect your system from a macro virus?
      Set macro security level in applications that allow macros.
    • What are some tips for preventing virus, worm, and Trojan horse infections?
      • Install a personal firewall program
      • Delete infected e-mail attachments immediately
      • Set macro security in programs
      • Never open unexpected e-mail attachments
      • Install antivirus programs on all computers
      • Check downloaded programs for viruses
    • What is a denial of service attack?
      An assault that disrupts computer access to an Internet service.
    • What is a back door in computer security?
      A program that allows users to bypass security controls.
    • What is spoofing in network security?
      Makes a network transmission appear legitimate.
    • What is IP spoofing?
      When an intruder fools a network into believing its IP address is trusted.
    • What is a firewall?
      A security system that prevents unauthorized intrusion.
    • What is a user name?
      A unique combination of characters that identifies a user.
    • What is hardware theft?
      The act of stealing computer equipment.
    • What is hardware vandalism?
      The act of defacing or destroying computer equipment.
    • What is a biometric device?
      A device that authenticates a person's identity using personal characteristics.
    • What is a personal firewall utility?
      A program that protects a personal computer from unauthorized intrusions.
    • What is software theft?
      The act of stealing or illegally copying software.
    • What is encryption?
      The process of converting plaintext into ciphertext to safeguard information.
    • What is a license agreement?
      The right to use software under specified conditions.
    • What is a certificate authority (CA)?
      An authorized entity that issues and verifies digital certificates.
    • What is Secure Sockets Layer (SSL)?
      A protocol that provides encryption of data between client and server.
    • What is a backup?
      A duplicate of a file, program, or disk.
    • What is a surge protector?
      A device that protects computer equipment from electrical disturbances.
    • What is computer ethics?
      Moral guidelines that govern the use of computers and information systems.
    • What is information privacy?
      The right of individuals to deny or restrict the collection of their information.
    • What is spyware?
      A program placed on a computer without the user's knowledge.
    • What is adware?
      A program that displays online advertisements.
    • What is spam?
      An unsolicited e-mail message sent to many recipients.
    • What is content filtering?
      The process of restricting access to certain material on the Internet.
    • What is computer forensics?
      The discovery, collection, and analysis of evidence found on computers.
    • What is phishing?
      A scam that attempts to obtain personal and financial information.
    • What are some health concerns of computer use?
      Computer vision syndrome, repetitive strain injury, and carpal tunnel syndrome.
    • What is green computing?
      Reducing electricity and environmental waste while using computers.
    • What is a computer security risk?
      An action that causes loss of or damage to a computer system