4.1

    Cards (27)

    • define computer vulnerablilty
      a weakness or flaw in a computer system or connectivity to a computer system.
    • what is an example of a computers vulnerability?
      hardware, software, data communications, users
    • what are some external sources of vulnerability?
      natural disasters, power surges, fires
    • what are some internal sources of vulnerability?
      no back ups, no anti viruses, former employees whose passwords and security information have not been removed from the system, employees that over ride or delete data
    • what is computer security
      the protection of a computers hard =ware and software from damage, theft or coruption.
    • what is data security?
      the protection of a computers data from damage and loss
    • what is hacking?
      the unauthorized access to a computer system or network to steal or damage data and or programs
    • what causes accidental damage?
      when the data or programs are damaged be cause of genuine errors made by a person
    • when does deliberate damage occur
      when an individual plans or attempts to damage or steal from another network or system
    • what is a cyber threat
      an unauthorized attepmt to access a system, device or network via the internet.
    • what does malware stand for
      malicious software
    • define cyberbullying
      the act of using technology to harass or harm individuals over the internet or on social media platforms
    • Define copyright infringement.
      the unauthorized use, reproduction or distribution of copyrighted material without permison from the owener
    • what is propriety data?
      the data developed and used exclusively by an organization
    • define propaganda
      the distribution of misleading information to sway the oppionin of the public using online platforms
    • what is identity theft
      the use of someone's personal info for financial gain or other criminal activity
    • how can we prevent identity fraud
      using secure websites when purchasing, using a card that is not a debit card on questionable websites, checking card statements regularly for fraud.
    • what are phishing attacks
      the use of websites and emails to trick individuals into revealing personal and sensitive information for financial gain or criminal activities.
    • what are some signs of a DOS attack
      recieving lots of junk mail, websites crashing or being slow, network connection slowing down
    • what is a DOS attack
      An attempt to make a server or network unavailable to legitimate users by flooding it with attack packets
    • define electronic eavesdropping
      the use of electronic devices to monitor the electronic communications of two or more computer devices
    • what is computer fraud
      a wide range of malicous activities that involve the use of computers
    • define data theft
      stealing peronal or important info from people or organizations computers or networks
    • what is transmission of viruses
      intensionally sending viruses, trojans, and worms to other computer systems with the intent of harming them.
    • define the term ' online puplication of obsene materials
      sharing explicit content on social media without consent or illegally
    • what is software and music piracy
      illegally downloading, copying or sharing software or music for free or before its released
    • define the term violation of privacy
      intruding into a person's personal life without consent via hacking, surveillance, etc
    See similar decks