Term
|
Definition
| is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability |
|
|
Term
|
Definition
| is an online or Internet-based illegal act |
|
|
Term
|
Definition
Files become corrupted Available memory is less than expected Screen displays unusual message or image Music or unusual sound plays randomly Existing programs and files disappear Programs or files do not work properly Unknown programs or files mysteriously appear System properties change Operating system does not start up Operating system shuts down unexpectedly Operating system runs much slower than usual |
|
|
Term
Internet Attacks denial of service attack (DoS attack) |
|
Definition
| disrupts computer access to Internet services |
|
|
Term
|
Definition
| distributed denial of service |
|
|
Term
|
Definition
| is a group of compromised computers connected to a network |
|
|
Term
Internet Attacks back door |
|
Definition
| is a program or set of instructions in a program that allow users to bypass security controls |
|
|
Term
|
Definition
| is a technique intruders use to make their network or Internet transmission appear legitimate |
|
|
Term
|
Definition
|
|
Term
|
Definition
| is hardware and/or software that protects a network’s resources from intrusion |
|
|
Term
| Intrusion detection software |
|
Definition
Analyzes all network traffic Assesses system vulnerabilities Identifies any unauthorized intrusions Notifies network administrators of suspicious behavior patterns or security breaches SANS: Intrusion Detection FAQ: AINT Misbehaving: A Taxonomy of Anti-Intrusion Techniques |
|
|
Term
|
Definition
| define who can access a computer, when they can access it, and what actions they can take |
|
|
Term
|
Definition
| log both successful and unsuccessful attempts |
|
|
Term
| Identification and authentication |
|
Definition
a two-phase process: identification: are you a valid user? (user name) authentication: are you who you say you are? passwords, CAPTCHAs, other enhanced access tools (see next slide) |
|
|
Term
|
Definition
| (“Completely Automated Public Turing test to tell Computers and Humans Apart”) |
|
|
Term
|
Definition
is any item that you must carry to gain access to a computer or computer facility (badges, smart cards, keys) Often are used in combination with a PIN |
|
|
Term
|
Definition
| authenticates a person’s identity by translating a personal characteristic into a digital code that is compared with a digital code in a computer |
|
|
Term
|
Definition
| is the discovery, collection, and analysis of evidence found on computers and networks |
|
|
Term
|
Definition
| occurs when someone steals personal or confidential information |
|
|
Term
|
Definition
User Identification/authentication Encryption |
|
|
Term
|
Definition
| is a process of converting readable data into unreadable characters to prevent unauthorized access |
|
|
Term
|
Definition
| is an encrypted code that a person, Web site, or organization attaches to an electronic message to verify the identity of the sender |
|
|
Term
|
Definition
| is a notice that guarantees a user or a Web site is legitimate |
|
|
Term
digital certificate Issued by a |
|
Definition
|
|
Term
|
Definition
| allows individuals to detect wireless networks while driving a vehicle through the area |
|
|
Term
|
Definition
| is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed |
|
|
Term
| Offsite backups are stored in a location separate from |
|
Definition
|
|
Term
| Two categories of backups: |
|
Definition
Full backup Selective backup Three-generation backup policy |
|
|
Term
| The widespread use of computers has led to health concerns |
|
Definition
Repetitive strain injury (RSI) Tendonitis Carpal tunnel syndrome (CTS) Computer vision syndrome (CVS) Computer addiction occurs when the computer consumes someone’s entire social life |
|
|
Term
|
Definition
are the moral guidelines that govern the use of computers and information systems Information accuracy is a concern Not all information on the Web is correct |
|
|
Term
| Intellectual property rights |
|
Definition
| are the rights to which creators are entitled for their work |
|
|
Term
|
Definition
refers to the right of individuals and companies to deny or restrict the collection and use of information about them Huge databases store data online It is important to safeguard your information |
|
|
Term
|
Definition
| protects any tangible form of expression |
|
|
Term
| Digital rights management |
|
Definition
| (DRM) is a strategy designed to prevent illegal distribution of movies, music, and other digital content |
|
|
Term
| Common Points of Privacy Laws |
|
Definition
Limit collected information to only what is necessary Limit access to those who need it to perform their jobs Outside release only with permission Provide opportunity to verify correctness Informed Consent: consent given before collection of personal information with knowledge of material facts needed to make a rational decision about providing the information Opt-in: affirmative action required by consumer to allow collection/use Opt-out: collection/use by default, consumer must take action to prevent |
|
|
Term
|
Definition
| is a small text file that a Web server stores on your computer |
|
|
Term
|
Definition
| is an unsolicited e-mail message or newsgroup posting |
|
|
Term
|
Definition
| blocks e-mail messages from designated sources |
|
|
Term
|
Definition
| attempt to remove spam before it reaches your inbox |
|
|
Term
|
Definition
| is a scam in which a perpetrator sends an official looking e-mail message that attempts to obtain your personal and financial information |
|
|
Term
|
Definition
| uses a clickable object on a Web site (button, image, link) which contains a malicious program (e.g. virus download, redirection to phony site) |
|
|
Term
|
Definition
| is defined as gaining unauthorized access or obtaining confidential information by taking advantage of trust and naivety |
|
|
Term
|
Definition
| involves the use of computers to observe, record, and review an employee’s use of a computer |
|
|