Term
|
Definition
| sometime called security patch, fixes software, bugs and flaws and is typically distributed to software users through online software updates: adobe acrobat |
|
|
Term
|
Definition
| malicious software, designed to damage, corrupt, illegally manipulate computer resources: viruses, worms, spyware |
|
|
Term
|
Definition
| self replicating software that infects a computer without user knowledge; attaches to a host, can be downloaded, emailed, picked up by flash drives, embeds in programs, files and devices, used to destroy data or keep systems from working |
|
|
Term
|
Definition
| can replicate itself but does not need a host file. moves from system to system through networks rather than files; encrypt files, bog networks, moves fast: 1-10 million; conficker worm: 10 million infections |
|
|
Term
|
Definition
| greeks vs. trojans; seems harmless but carries destructive payload, cannot self replicate, payload can contain viruses, worms, spyware and backdoors; also has RATs |
|
|
Term
|
Definition
| extends to internet; espionage, psychological warfare, attacks |
|
|
Term
|
Definition
| criminal act of stealing info about a person to assume their identity in order to commit fraud; 18-24 hit hardest |
|
|
Term
|
Definition
| crime of deliberately deceiving a person over the internet to damage them or obtain property or services illegally |
|
|
Term
|
Definition
| SSL certificate; electronic business card attached to internet transmitted data to verify sender of data |
|
|
Term
|
Definition
| combines both fraudulent email and website to trick a person to provide private info used for identity theft; most difficult to detect |
|
|
Term
|
Definition
| remote access trojans; obtained through small files like online greeting cards, games, free software; can log key strokes, capture voice conversations, capture web camera video sessions, hijack computers |
|
|
Term
|
Definition
| virus scan software uses several techniques to find viruses, worms, spyware on a computer system; remove them if possible, keep additional viruses, worms and spyware from infecting the system |
|
|
Term
|
Definition
| collection of computers autonomously or automatically working together toward a goal; often zombie computers synchronized to perform illegal activities on the internet; can be 100s of 1000's of compromised computers |
|
|
Term
|
Definition
| process in which copies of important computer files are stored in a safe place to guard against data loss |
|
|
Term
|
Definition
|
|
Term
|
Definition
| select which files to back up |
|
|
Term
|
Definition
| preserves 3 copies of important files |
|
|
Term
|
Definition
| restore files by copying to original location |
|
|
Term
|
Definition
| network concerned with addressing vulnerabilities and threats in computer networks that may or may not be connected to the internet; as long as there is an internet connection there is an increased risk of unauthorized access |
|
|
Term
|
Definition
| gaining access to a computer, network, file or other resources without permission; hijacking, wifi piggybacking, interception of communication |
|
|
Term
|
Definition
| using computer for unauthorized activities |
|
|
Term
|
Definition
| motivation: theft, hijacking computers, cyber terrorism, for fun; types::::: authorized, unauthorized, white hat, black hat |
|
|
Term
|
Definition
| hacking into wifi connection often done in conjunction with war driving |
|
|
Term
|
Definition
| file systems permissions refers to specific access privileges afforded to each network user and each system resource in terms of which files, folders, drives each user can read, write and execute |
|
|
Term
|
Definition
| network security threats that originate from within a network, typically from registered users; data entry errors, errors in programming, improper installation, setup of computer systems, mishandling of computer output |
|
|
Term
|
Definition
| refers to the access of information by an unauthorized person for financial gain or other benefit |
|
|
Term
|
Definition
| document, agreement, contract that defines acceptable and unacceptable uses of computer and network resources for a business or organization |
|
|
Term
|
Definition
| refers to unique threats and defenses associated with wireless computer networks |
|
|
Term
|
Definition
| individual who subverts computer security without authorization |
|
|
Term
| hacker -- keylogging and packet sniffing |
|
Definition
| sees what and when you type; tries to decrypt, looks for password, security information, social security |
|
|
Term
|
Definition
| network hardware or software that examines data packets flowing in and sometimes out of a network or computer in order to filter out packets that are potentially dangerous |
|
|
Term
| 4 pillars of info security |
|
Definition
| installing software patches, using security software, firewall usage, practicing safe, cautious online behavior |
|
|
Term
|
Definition
| code division multiple access; networking standard in US |
|
|
Term
|
Definition
|
|
Term
|
Definition
wireless fidelity; 250-1000 ft; 802.11 is temples
b-11mbps g-54 mbps n-300+ mbps |
|
|
Term
|
Definition
| covers large areas with high speed internet that rivals cable modems and DSL |
|
|
Term
|
Definition
| page font, font size, text color, background image, background color |
|
|
Term
|
Definition
| LTE; fourth generation wireless broadband technology developed to allow GSM cellular technology to evolve to provide very high speed internet access |
|
|
Term
|
Definition
| radio frequency identification;tiny transponder tags can be attached to merchandise or other objects and read wirelessly using RFID reader |
|
|
Term
|
Definition
| global positioning systems; 3 needed to ensure accuracy |
|
|
Term
|
Definition
| local area network; privately owned computer network that connects computers and devices within same building or local geographic area |
|
|
Term
|
Definition
| Metropolitan area network; interconnection of LANs within city or town |
|
|
Term
|
Definition
wide area network; connects LANs and MANs between cities across a country, around the world, using microwave and satellite transmissions or telephone lines
lan becomes wan when moving from 1 geographic location to another |
|
|
Term
|
Definition
| refers to protection of info systems and info they manage against unauthorized access use and manipulation or destruction and against denial of service to authorized users |
|
|
Term
|
Definition
| refers to actions taken to protect information on a computer that may or may not be connected to a computer or the internet |
|
|
Term
|
Definition
| security process in which the identity of a person is verified |
|
|
Term
| something you know -- authentication |
|
Definition
| information: password or personal identification number, PIN |
|
|
Term
| something you have -- authentication |
|
Definition
| ID card, badge, smart card |
|
|
Term
| something about you -- identification |
|
Definition
| fingerprints, retinal features, facial features |
|
|
Term
|
Definition
| item you must carry to gain access to computer or facility; often used with numeric password called a PIN |
|
|
Term
|
Definition
| something about you, authenticating persons identity using personal characteristic; fingerprint, hand geometry, voice, signature, iris |
|
|
Term
|
Definition
| security technique that uses high level mathematical functions and computer algorithms to decode data so it is unintelligible to all but the intended recipient |
|
|
Term
|
Definition
MAC: filevault PC: bitlocker wifi: wep, wpa, wpa2 (WEP=wired equiv. privacy) (WPA=wifi protected access) disable ssid add mac filtering HTTPS=secure |
|
|
Term
|
Definition
|
|
Term
|
Definition
| hyper text transfer protocol |
|
|
Term
|
Definition
| sending device, networking device, networking medium, networking device, receiving device |
|
|
Term
|
Definition
| computer, cell phone, laptop |
|
|
Term
|
Definition
| internal, external, email |
|
|
Term
|
Definition
|
|
Term
| 3 image map hotspot tools |
|
Definition
| rectangles, circles, polygons |
|
|
Term
|
Definition
| fiber optic lines, telephone lines |
|
|
Term
|
Definition
| text field, text area, check box, list/menu, radio group |
|
|
Term
| telecommunication signals |
|
Definition
analog and digital electronic transmissions for the purpose of communication
low freq - relaxed wave high freq - perm-like |
|
|
Term
|
Definition
| hypertext markup language |
|
|
Term
|
Definition
| anything that carries a signal and creates an interface between a sending device and receiving a device |
|
|
Term
|
Definition
|
|
Term
|
Definition
| telephone and computer networks |
|
|
Term
|
Definition
|
|
Term
|
Definition
| cable tv and other applications |
|
|
Term
|
Definition
|
|
Term
|
Definition
| backbones of telecommunication networks and in some local area networks |
|
|
Term
| file name of your homepage |
|
Definition
|
|
Term
|
Definition
| capable of carrying significantly more data at faster speeds than wire cables; less susceptible to interference and more secure; smaller size (thinner and lighter) |
|
|
Term
|
Definition
| global system for mobile communications; most popular standard for mobile phones; 200 billion! good for travelers, use SIM cards |
|
|
Term
| publish to in astro account |
|
Definition
|
|
Term
|
Definition
| manipulate files of info as digits, 1 and 0, on and off, in order to store and manage info more efficiently and effectively, digital as opposed to analog |
|
|
Term
|
Definition
| understanding of how computer represent different types of data with digits and how usefulness of that representation assists people in leading productive lives; online apps, books, schoolwork |
|
|
Term
|
Definition
| digital electronics device that combines hardware and software to accept the input of data and then process and store the data to produce some useful output |
|
|
Term
| 5 primary functions of a computer |
|
Definition
| computation, automation, communication, entertainment and managing info |
|
|
Term
|
Definition
|
|
Term
|
Definition
| CPU; computer processing unit |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| math, calculations used to hack or break codes, solve problems |
|
|
Term
|
Definition
|
|
Term
|
Definition
| computer to computer or other devices |
|
|
Term
|
Definition
| speed, reliability, consistency, storage and communication |
|
|
Term
|
Definition
| binary digit, 1 or 0; smallest unit of info that a digital electronics device can manipulate |
|
|
Term
|
Definition
|
|
Term
|
Definition
| process of transforming info such as text, images, sounds, into digital representation (1 and 0) so it can be stored and processed by computers |
|
|
Term
|
Definition
| takes advantage that digitization standardizes all types of data to 1 and 0 to create devices that combine functionality of several digital electronic devices into one |
|
|
Term
|
Definition
| describes computer architecture in terms of hardware and software |
|
|
Term
|
Definition
| implies computing and info technologies are diffused throughout the environment |
|
|
Term
|
Definition
| advanced research projects agency; pentagon networking project; goal is to all scientists at different locations to share information, to function if part of network disabled; 1969; started as 4 node WAN, by 1984 had 1000 nodes |
|
|
Term
|
Definition
| world wide web consortium; oversees research, sets standards and guidelines; tim berners-lee |
|
|
Term
|
Definition
| internet related research and development project; develops and tests advanced internet technologies; led by 200+ universities |
|
|
Term
| some ways to access internet |
|
Definition
| dial up, satellite, digital subscriber line, cable, broadband over fiber |
|
|
Term
|
Definition
| transmission control protocol |
|
|
Term
|
Definition
|
|
Term
|
Definition
| Infrastructure as a service; cloud companies rent businesses serveres, storage and networking hardware; amazon and microsoft; cheaper |
|
|
Term
|
Definition
| Platform as a service; hardest of 3 services to understand as a layperson; cloud companies offer virtual servers and operating systems to help businesses to develop and deploy apps and software; google app engine |
|
|
Term
|
Definition
| Software as a service; running software off a website instead of installing the software onto your computer; gmail, google docs, flikr; icloud; sugarsync |
|
|
Term
|
Definition
| electronics component typically composed of silicon that opens or closes a circuit to alter the flow of electricity to store and manipulate bits; flowing -- 1, not flowing -- 0 |
|
|
Term
|
Definition
| # of transistors on a chip will double every 2 years |
|
|
Term
|
Definition
| arithmetic logic unit; performs logical operations |
|
|
Term
|
Definition
| random access memory; temporary, volatile memory that stores bytes of data and program instructions for the processor to access |
|
|
Term
|
Definition
| storage technology that uses the magnetic properties of particles rather than electric charges to store bits and bytes more permanently than RAM; magnetized/on -- 1, nonmagnetized/off -- 0 |
|
|
Term
|
Definition
| narrow recording band that forms full circle on disk |
|
|
Term
|
Definition
| stores up to 512 bytes of data |
|
|
Term
|
Definition
|
|
Term
| characteristics of hard disk |
|
Definition
| advertised capacity, access time, cylinders, bps, sectors per track |
|
|
Term
|
Definition
| budget, speed, color or black and white, cost per page, multiple copies, wireless capability, paper types and sizes |
|
|
Term
|
Definition
| resolution, lens and sensor, price, size, interfaces, battery, software |
|
|