Term
|
Definition
Can be two types; (1) It can be an illegal act perpetrated against computers or telecommunications, or (2) it can be the use of computers or telecommunications to accomplish an illegal act. |
|
|
Term
Evil twin attack (pg. 474) |
|
Definition
In which a hacker or cracker sets up a Wi-Fi hot spot or access point that makes your computer think it’s accessing a safe public network or your home network and then monitors your communications and steals data you enter into a website |
|
|
Term
|
Definition
A computer taken over covertly and programmed to respond to instructions sent remotely |
|
|
Term
|
Definition
Short for “robot network,”; A network of computers compromised by means of a Trojan horse that plants instructions within each PC to wait for commands from the person controlling that network. |
|
|
Term
|
Definition
A system of safeguards for protecting information technology against disasters, system failures, and unauthorized access that can result in damage or loss. |
|
|
Term
Disaster recovery plan (pg. 481) |
|
Definition
A method of restoring information-processing operations that have been halted by destruction or accident |
|
|
Term
List the five limitations users should bear in mind when using databases for research. (pgs. 467-468) |
|
Definition
|
|
Term
Describe various errors, accidents, and natural hazards that can affect computer systems. (pgs. 468-471) |
|
Definition
|
|
Term
Identify five types of theft involving computers and computer systems. (pgs. 471-473) |
|
Definition
|
|
Term
Describe types of internet fraud. (pgs. 473-475) |
|
Definition
|
|
Term
List seven types of parties that are known to have committed computer crimes. (pgs. 475-476) |
|
Definition
|
|
Term
Summarize three ways to deter computer crimes. (pgs. 478-479) |
|
Definition
|
|
Term
What are three methods that security systems use to verify an individual’s legitimate right of access? (pgs. 479-480) |
|
Definition
|
|
Term
Describe the purpose and features of a disaster-recovery plan. (pgs. 481-482) |
|
Definition
|
|
Term
Describe three types of mental-health problems linked to information technology. (pgs. 474-475) |
|
Definition
|
|
Term
Summarize some of the problems resulting from computers that impede productivity in the workplace. (pgs. 487-488) |
|
Definition
|
|
Term
What has been the impact of technology on employment? (pg. 490) |
|
Definition
|
|
Term
What have some executives done because of the lack of reliability of the public internet? (pg. 491) |
|
Definition
|
|