Term
-Natural Disasters -Accidents -Employees and consultants -Links to Outside Business Contacts -Outsiders |
|
Definition
What are the primary threats to IS security? |
|
|
Term
The act of using a computer to commit an illegal act including: -Targeting a computer to commit an offense -Using a computer to commit an offense -Using a computer to support criminal activity |
|
Definition
What is a computer crime? |
|
|
Term
-Hackers gain access to computer systems without authorization (started at MIT) -Crackers intend on breaking into a computer system without malicious intent -Hactivists intend on spreading a political or idealogic goal through defacing a website |
|
Definition
Differentiate between types of computer criminals (i.e. hackers, crackers, hactivists) |
|
|
Term
-Unauthorized access occurs when people who are not authorized look through, manipulate or handle stored data (over-shoulder viewing, breaking in, obtaining information for sale) -Change information through cracking (changing an employee's bonus) |
|
Definition
Differentiate between types of computer crimes (i.e., unauthorized access and information modification). |
|
|
Term
Short for 'malicious software' which causes organizations money every year. |
|
Definition
|
|
Term
viruses-a destructive program that disrupts the normal function of a computer. It can reproduce itself worms-similar to a virus, but targeted at networks. Can corrupt servers which will deny internet service to customer trojan horses-appear to be running a program normally when downloaded, but run background programs which can corrupt computers |
|
Definition
?What types of malware are there |
|
|
Term
Stealing of a person's social security number, credit card number, and credit score to withdraw money, make purchases, and run up debts that won't be repaid. |
|
Definition
|
|
Term
Passing on of information about current events. Spammers may harvest information to flood in-boxes with junk-mail. |
|
Definition
What is an internet hoax? |
|
|
Term
Cyberharrassment-using a computer to communicate obscene, vulgar, or threatening messages that could cause distress to others Cyberstalking-Repeated contacts with another person Cyberbullying-Use of the internet to deliberately cause emotional distress to someone |
|
Definition
Differentiate between cyberharrassment, cyberstalking and cyberbullying. |
|
|
Term
The purchase of one copy of a software application and then make many copies to distribute to others |
|
Definition
|
|