Save
I.T
4.1
Save
Share
Learn
Content
Leaderboard
Learn
Created by
Rylee .
Visit profile
Cards (27)
define computer
vulnerablilty
a
weakness
or flaw in a computer system or
connectivity
to a computer system.
View source
what is an example of a computers vulnerability?
hardware
, software,
data communications
, users
View source
what are some external sources of vulnerability?
natural
disasters
, power surges,
fires
View source
what are some internal sources of vulnerability?
no back ups, no
anti viruses
, former employees whose
passwords
and security information have not been removed from the system, employees that over ride or delete data
View source
what is computer security
the
protection
of a computers
hard
=ware and software from damage, theft or coruption.
View source
what is data security?
the
protection
of a computers data from
damage
and loss
View source
what is hacking?
the unauthorized access to a
computer system
or network to steal or
damage data
and or programs
View source
what causes accidental damage?
when the data or programs are
damaged
be cause of
genuine errors
made by a person
View source
when does deliberate damage occur
when an individual plans or attempts to
damage
or steal from another
network
or system
View source
what is a cyber threat
an unauthorized attepmt to access a system, device or network via the
internet.
View source
what does malware stand for
malicious software
View source
define cyberbullying
the act of using technology to
harass
or harm individuals over the internet or on
social media
platforms
View source
Define copyright infringement.
the unauthorized use,
reproduction
or distribution of copyrighted material without
permison
from the owener
View source
what is propriety data?
the data developed and used exclusively by an
organization
View source
define
propaganda
the distribution of
misleading
information to sway the
oppionin
of the public using online platforms
View source
what is identity
theft
the use of someone's
personal info
for
financial gain
or other criminal activity
View source
how can we prevent identity fraud
using secure websites when purchasing, using a
card
that is not a debit card on questionable websites, checking card statements regularly for
fraud.
View source
what are phishing attacks
the use of websites and emails to trick individuals into revealing personal and sensitive information for
financial
gain or
criminal
activities.
View source
what are some signs of a DOS attack
recieving lots of
junk
mail, websites
crashing
or being slow, network connection slowing down
View source
what is a DOS attack
An attempt to make a server or network
unavailable
to legitimate users by flooding it with attack
packets
View source
define
electronic eavesdropping
the use of
electronic
devices to monitor the electronic
communications
of two or more computer devices
View source
what is computer fraud
a wide range of
malicous
activities that involve the use of computers
View source
define data
theft
stealing
peronal
or important info from people or organizations
computers
or networks
View source
what is transmission of viruses
intensionally sending
viruses
, trojans, and
worms
to other computer systems with the intent of harming them.
View source
define the term ' online puplication of obsene materials
sharing explicit content on social media without
consent
or
illegally
View source
what is software and music piracy
illegally
downloading,
copying
or sharing software or music for free or before its released
View source
define the term
violation
of
privacy
intruding into a person's personal life without
consent
via
hacking
, surveillance, etc
View source