4.1

Cards (27)

  • define computer vulnerablilty
    a weakness or flaw in a computer system or connectivity to a computer system.
  • what is an example of a computers vulnerability?
    hardware, software, data communications, users
  • what are some external sources of vulnerability?
    natural disasters, power surges, fires
  • what are some internal sources of vulnerability?
    no back ups, no anti viruses, former employees whose passwords and security information have not been removed from the system, employees that over ride or delete data
  • what is computer security
    the protection of a computers hard =ware and software from damage, theft or coruption.
  • what is data security?
    the protection of a computers data from damage and loss
  • what is hacking?
    the unauthorized access to a computer system or network to steal or damage data and or programs
  • what causes accidental damage?
    when the data or programs are damaged be cause of genuine errors made by a person
  • when does deliberate damage occur
    when an individual plans or attempts to damage or steal from another network or system
  • what is a cyber threat
    an unauthorized attepmt to access a system, device or network via the internet.
  • what does malware stand for
    malicious software
  • define cyberbullying
    the act of using technology to harass or harm individuals over the internet or on social media platforms
  • Define copyright infringement.
    the unauthorized use, reproduction or distribution of copyrighted material without permison from the owener
  • what is propriety data?
    the data developed and used exclusively by an organization
  • define propaganda
    the distribution of misleading information to sway the oppionin of the public using online platforms
  • what is identity theft
    the use of someone's personal info for financial gain or other criminal activity
  • how can we prevent identity fraud
    using secure websites when purchasing, using a card that is not a debit card on questionable websites, checking card statements regularly for fraud.
  • what are phishing attacks
    the use of websites and emails to trick individuals into revealing personal and sensitive information for financial gain or criminal activities.
  • what are some signs of a DOS attack
    recieving lots of junk mail, websites crashing or being slow, network connection slowing down
  • what is a DOS attack
    An attempt to make a server or network unavailable to legitimate users by flooding it with attack packets
  • define electronic eavesdropping
    the use of electronic devices to monitor the electronic communications of two or more computer devices
  • what is computer fraud
    a wide range of malicous activities that involve the use of computers
  • define data theft
    stealing peronal or important info from people or organizations computers or networks
  • what is transmission of viruses
    intensionally sending viruses, trojans, and worms to other computer systems with the intent of harming them.
  • define the term ' online puplication of obsene materials
    sharing explicit content on social media without consent or illegally
  • what is software and music piracy
    illegally downloading, copying or sharing software or music for free or before its released
  • define the term violation of privacy
    intruding into a person's personal life without consent via hacking, surveillance, etc