You are on page 1of 1

Computer Security and Privacy

Study online at quizlet.com/_1nqi9s

1. Affects a computer negatively by altering Computer 19. It is the use of a computer or network Unauthorized
the way the computer works. Virus without permission. Access
2. A compromised computer is known as a... Zombie 20. It occurs when someone steals personal or Information
confidential information. Theft
3. Copies itself repeatedly, using up resources Worm
and possibly shutting down the computer or 21. A malicious program that hides within or Trojan Horse
network. looks like a legitimate program.
4. It authenticates a person's identity by Biometric 22. A person who uses computer expertise to Hacker
translating a personal characteristic into a Device gain unauthorized access to a computer,
digital code that is compared with a digital and then misuses or tampers the programs
code in a computer. and data stored on the computer.
5. It disrupts computer access to Internet Denial of 23. Program that hides in a computer and Rootkit
services. Service allows someone from a remote location to
attack (DoS take full control.
attack)
24. Some software requires _____ to function Product
6. It is a group of compromised computers Botnet fully Activation
connected to a network.
25. They define who can access a computer, Access
7. It is an online or internet-based illegal act. Cybercrime when they can access it, and what actions controls
they can take.
8. It is any event or action that could cause a Computer
loss of or damage to computer hardware, Security Risk 26. Vulnerable computer that is set up to entice Honeypot
software, data, information, or processing an intruder to break into it.
capability.
9. It is any item that you must carry to gain Possessed
access to a computer or computer facility. Object
10. It is a process of converting readable data Encryption
into unreadable characters to prevent
unauthorized access.
11. It is a program or set of instructions in a Back door
program that allow users to bypass security
controls.
12. It is a technique intruders use to make their Spoofing
network or Internet transmission appear
legitimate.
13. It is a web site that evaluates your computer Online
to check for internet and e-mail Security
vulnerabilities. Service
14. It is hardware and/or software that protects Firewall
a network's resources from intrusion.
15. It is the act of defacing or destroying Hardware
computer equipment. Vandalism
16. It is the act of stealing computer equipment. Hardware
Theft
17. It is the discovery, collection, and analysis Digital
of evidence found on computers and Forensics
networks.
18. It is the use of a computer or its data for Unauthorized
unapproved or possibly illegal activities Use

You might also like