Term
|
Definition
sometime called security patch, fixes software, bugs and flaws and is typically distributed to software users through online software updates: adobe acrobat |
|
|
Term
|
Definition
malicious software, designed to damage, corrupt, illegally manipulate computer resources: viruses, worms, spyware |
|
|
Term
|
Definition
self replicating software that infects a computer without user knowledge; attaches to a host, can be downloaded, emailed, picked up by flash drives, embeds in programs, files and devices, used to destroy data or keep systems from working |
|
|
Term
|
Definition
can replicate itself but does not need a host file. moves from system to system through networks rather than files; encrypt files, bog networks, moves fast: 1-10 million; conficker worm: 10 million infections |
|
|
Term
|
Definition
greeks vs. trojans; seems harmless but carries destructive payload, cannot self replicate, payload can contain viruses, worms, spyware and backdoors; also has RATs |
|
|
Term
|
Definition
extends to internet; espionage, psychological warfare, attacks |
|
|
Term
|
Definition
criminal act of stealing info about a person to assume their identity in order to commit fraud; 18-24 hit hardest |
|
|
Term
|
Definition
crime of deliberately deceiving a person over the internet to damage them or obtain property or services illegally |
|
|
Term
|
Definition
SSL certificate; electronic business card attached to internet transmitted data to verify sender of data |
|
|
Term
|
Definition
combines both fraudulent email and website to trick a person to provide private info used for identity theft; most difficult to detect |
|
|
Term
|
Definition
remote access trojans; obtained through small files like online greeting cards, games, free software; can log key strokes, capture voice conversations, capture web camera video sessions, hijack computers |
|
|
Term
|
Definition
virus scan software uses several techniques to find viruses, worms, spyware on a computer system; remove them if possible, keep additional viruses, worms and spyware from infecting the system |
|
|
Term
|
Definition
collection of computers autonomously or automatically working together toward a goal; often zombie computers synchronized to perform illegal activities on the internet; can be 100s of 1000's of compromised computers |
|
|
Term
|
Definition
process in which copies of important computer files are stored in a safe place to guard against data loss |
|
|
Term
|
Definition
|
|
Term
|
Definition
select which files to back up |
|
|
Term
|
Definition
preserves 3 copies of important files |
|
|
Term
|
Definition
restore files by copying to original location |
|
|
Term
|
Definition
network concerned with addressing vulnerabilities and threats in computer networks that may or may not be connected to the internet; as long as there is an internet connection there is an increased risk of unauthorized access |
|
|
Term
|
Definition
gaining access to a computer, network, file or other resources without permission; hijacking, wifi piggybacking, interception of communication |
|
|
Term
|
Definition
using computer for unauthorized activities |
|
|
Term
|
Definition
motivation: theft, hijacking computers, cyber terrorism, for fun; types::::: authorized, unauthorized, white hat, black hat |
|
|
Term
|
Definition
hacking into wifi connection often done in conjunction with war driving |
|
|
Term
|
Definition
file systems permissions refers to specific access privileges afforded to each network user and each system resource in terms of which files, folders, drives each user can read, write and execute |
|
|
Term
|
Definition
network security threats that originate from within a network, typically from registered users; data entry errors, errors in programming, improper installation, setup of computer systems, mishandling of computer output |
|
|
Term
|
Definition
refers to the access of information by an unauthorized person for financial gain or other benefit |
|
|
Term
|
Definition
document, agreement, contract that defines acceptable and unacceptable uses of computer and network resources for a business or organization |
|
|
Term
|
Definition
refers to unique threats and defenses associated with wireless computer networks |
|
|
Term
|
Definition
individual who subverts computer security without authorization |
|
|
Term
hacker -- keylogging and packet sniffing |
|
Definition
sees what and when you type; tries to decrypt, looks for password, security information, social security |
|
|
Term
|
Definition
network hardware or software that examines data packets flowing in and sometimes out of a network or computer in order to filter out packets that are potentially dangerous |
|
|
Term
4 pillars of info security |
|
Definition
installing software patches, using security software, firewall usage, practicing safe, cautious online behavior |
|
|
Term
|
Definition
code division multiple access; networking standard in US |
|
|
Term
|
Definition
|
|
Term
|
Definition
wireless fidelity; 250-1000 ft; 802.11 is temples
b-11mbps g-54 mbps n-300+ mbps |
|
|
Term
|
Definition
covers large areas with high speed internet that rivals cable modems and DSL |
|
|
Term
|
Definition
page font, font size, text color, background image, background color |
|
|
Term
|
Definition
LTE; fourth generation wireless broadband technology developed to allow GSM cellular technology to evolve to provide very high speed internet access |
|
|
Term
|
Definition
radio frequency identification;tiny transponder tags can be attached to merchandise or other objects and read wirelessly using RFID reader |
|
|
Term
|
Definition
global positioning systems; 3 needed to ensure accuracy |
|
|
Term
|
Definition
local area network; privately owned computer network that connects computers and devices within same building or local geographic area |
|
|
Term
|
Definition
Metropolitan area network; interconnection of LANs within city or town |
|
|
Term
|
Definition
wide area network; connects LANs and MANs between cities across a country, around the world, using microwave and satellite transmissions or telephone lines
lan becomes wan when moving from 1 geographic location to another |
|
|
Term
|
Definition
refers to protection of info systems and info they manage against unauthorized access use and manipulation or destruction and against denial of service to authorized users |
|
|
Term
|
Definition
refers to actions taken to protect information on a computer that may or may not be connected to a computer or the internet |
|
|
Term
|
Definition
security process in which the identity of a person is verified |
|
|
Term
something you know -- authentication |
|
Definition
information: password or personal identification number, PIN |
|
|
Term
something you have -- authentication |
|
Definition
ID card, badge, smart card |
|
|
Term
something about you -- identification |
|
Definition
fingerprints, retinal features, facial features |
|
|
Term
|
Definition
item you must carry to gain access to computer or facility; often used with numeric password called a PIN |
|
|
Term
|
Definition
something about you, authenticating persons identity using personal characteristic; fingerprint, hand geometry, voice, signature, iris |
|
|
Term
|
Definition
security technique that uses high level mathematical functions and computer algorithms to decode data so it is unintelligible to all but the intended recipient |
|
|
Term
|
Definition
MAC: filevault PC: bitlocker wifi: wep, wpa, wpa2 (WEP=wired equiv. privacy) (WPA=wifi protected access) disable ssid add mac filtering HTTPS=secure |
|
|
Term
|
Definition
|
|
Term
|
Definition
hyper text transfer protocol |
|
|
Term
|
Definition
sending device, networking device, networking medium, networking device, receiving device |
|
|
Term
|
Definition
computer, cell phone, laptop |
|
|
Term
|
Definition
internal, external, email |
|
|
Term
|
Definition
|
|
Term
3 image map hotspot tools |
|
Definition
rectangles, circles, polygons |
|
|
Term
|
Definition
fiber optic lines, telephone lines |
|
|
Term
|
Definition
text field, text area, check box, list/menu, radio group |
|
|
Term
telecommunication signals |
|
Definition
analog and digital electronic transmissions for the purpose of communication
low freq - relaxed wave high freq - perm-like |
|
|
Term
|
Definition
hypertext markup language |
|
|
Term
|
Definition
anything that carries a signal and creates an interface between a sending device and receiving a device |
|
|
Term
|
Definition
|
|
Term
|
Definition
telephone and computer networks |
|
|
Term
|
Definition
|
|
Term
|
Definition
cable tv and other applications |
|
|
Term
|
Definition
|
|
Term
|
Definition
backbones of telecommunication networks and in some local area networks |
|
|
Term
file name of your homepage |
|
Definition
|
|
Term
|
Definition
capable of carrying significantly more data at faster speeds than wire cables; less susceptible to interference and more secure; smaller size (thinner and lighter) |
|
|
Term
|
Definition
global system for mobile communications; most popular standard for mobile phones; 200 billion! good for travelers, use SIM cards |
|
|
Term
publish to in astro account |
|
Definition
|
|
Term
|
Definition
manipulate files of info as digits, 1 and 0, on and off, in order to store and manage info more efficiently and effectively, digital as opposed to analog |
|
|
Term
|
Definition
understanding of how computer represent different types of data with digits and how usefulness of that representation assists people in leading productive lives; online apps, books, schoolwork |
|
|
Term
|
Definition
digital electronics device that combines hardware and software to accept the input of data and then process and store the data to produce some useful output |
|
|
Term
5 primary functions of a computer |
|
Definition
computation, automation, communication, entertainment and managing info |
|
|
Term
|
Definition
|
|
Term
|
Definition
CPU; computer processing unit |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
math, calculations used to hack or break codes, solve problems |
|
|
Term
|
Definition
|
|
Term
|
Definition
computer to computer or other devices |
|
|
Term
|
Definition
speed, reliability, consistency, storage and communication |
|
|
Term
|
Definition
binary digit, 1 or 0; smallest unit of info that a digital electronics device can manipulate |
|
|
Term
|
Definition
|
|
Term
|
Definition
process of transforming info such as text, images, sounds, into digital representation (1 and 0) so it can be stored and processed by computers |
|
|
Term
|
Definition
takes advantage that digitization standardizes all types of data to 1 and 0 to create devices that combine functionality of several digital electronic devices into one |
|
|
Term
|
Definition
describes computer architecture in terms of hardware and software |
|
|
Term
|
Definition
implies computing and info technologies are diffused throughout the environment |
|
|
Term
|
Definition
advanced research projects agency; pentagon networking project; goal is to all scientists at different locations to share information, to function if part of network disabled; 1969; started as 4 node WAN, by 1984 had 1000 nodes |
|
|
Term
|
Definition
world wide web consortium; oversees research, sets standards and guidelines; tim berners-lee |
|
|
Term
|
Definition
internet related research and development project; develops and tests advanced internet technologies; led by 200+ universities |
|
|
Term
some ways to access internet |
|
Definition
dial up, satellite, digital subscriber line, cable, broadband over fiber |
|
|
Term
|
Definition
transmission control protocol |
|
|
Term
|
Definition
|
|
Term
|
Definition
Infrastructure as a service; cloud companies rent businesses serveres, storage and networking hardware; amazon and microsoft; cheaper |
|
|
Term
|
Definition
Platform as a service; hardest of 3 services to understand as a layperson; cloud companies offer virtual servers and operating systems to help businesses to develop and deploy apps and software; google app engine |
|
|
Term
|
Definition
Software as a service; running software off a website instead of installing the software onto your computer; gmail, google docs, flikr; icloud; sugarsync |
|
|
Term
|
Definition
electronics component typically composed of silicon that opens or closes a circuit to alter the flow of electricity to store and manipulate bits; flowing -- 1, not flowing -- 0 |
|
|
Term
|
Definition
# of transistors on a chip will double every 2 years |
|
|
Term
|
Definition
arithmetic logic unit; performs logical operations |
|
|
Term
|
Definition
random access memory; temporary, volatile memory that stores bytes of data and program instructions for the processor to access |
|
|
Term
|
Definition
storage technology that uses the magnetic properties of particles rather than electric charges to store bits and bytes more permanently than RAM; magnetized/on -- 1, nonmagnetized/off -- 0 |
|
|
Term
|
Definition
narrow recording band that forms full circle on disk |
|
|
Term
|
Definition
stores up to 512 bytes of data |
|
|
Term
|
Definition
|
|
Term
characteristics of hard disk |
|
Definition
advertised capacity, access time, cylinders, bps, sectors per track |
|
|
Term
|
Definition
budget, speed, color or black and white, cost per page, multiple copies, wireless capability, paper types and sizes |
|
|
Term
|
Definition
resolution, lens and sensor, price, size, interfaces, battery, software |
|
|