Term
|
Definition
Computer experts who are adept at attacking other people's computers |
|
|
Term
|
Definition
Illegal copying of software or data |
|
|
Term
|
Definition
WHO COMMITS THE MAJORITY OF ALL COMPUTER CRIMES IN BUSINESSES |
|
|
Term
|
Definition
SOME COMPUTER CRIMES DO NOT INVOLVE THE THEFT OF MONEY |
|
|
Term
|
Definition
Information stored on your computer by Internet sites you visit to record your habits and preferences at that site |
|
|
Term
|
Definition
Coding scheme used to prevent hackers from understanding data obtained by receiving transmitted signals over satellites or other media |
|
|
Term
|
Definition
Devices that can protect your computer from electrical spikes and loss of power |
|
|
Term
|
Definition
Coding scheme used to prevent hackers from "receiving" transmitted signals over satellites or other media |
|
|
Term
|
Definition
Type of malware which only attacks the resident computer, attacks a little bit every time the file is accessed, and doesn't attach itself to other files. |
|
|
Term
|
Definition
Name for coded file stored on your computer which allows spying on you, tracking your movement, etc |
|
|
Term
|
Definition
GENERAL NAME FOR ALL PROGRAMS DESIGNED TO DO DESTRUCTIVE DEEDS ON SOMEONES COMPUTER |
|
|
Term
|
Definition
1. Person who illegally gains entry to another’s computer, presumably with a malicious purpose |
|
|
Term
|
Definition
NAME FOR MAKING INSURANCE COPIES OF DATA |
|
|
Term
|
Definition
1. Type of malware which propagates itself both in your computer and others that are online |
|
|
Term
a. The extensive use of the Internet allows many more access points for one to attack from |
|
Definition
Why is it easier to break into computers now than it was 20 year ago |
|
|
Term
Trojan horse, virus, and worms |
|
Definition
|
|
Term
|
Definition
Type of malware which appears to be something useful, but is really destructive |
|
|
Term
|
Definition
Name for coded file stored on your computer which allows spying on you, tracking your movement, etc |
|
|
Term
|
Definition
Some controls to keep computer data safe |
|
|
Term
|
Definition
Type of malware which only attacks the resident computer, attacks a little bit every time the file is accessed, and doesn't attach itself to other files |
|
|
Term
|
Definition
Protocol type used in Internet and many network data transmissions |
|
|