Tuesday, February 10, 2015

Chapter 5

 1 . Digital security Risk - event or action that can cause loss or damage
 2. An illegal act involving the use of computer or related devices is referred to as .. - COMPUTERCRIME
 3 . __ is an online or internet basd illegal act - CYBERCRIME
 4 . Malware
 5.  A __ is a group computers connected to a network - BOTNET
 6. A __ disrupts computer access to internet services - DOS ATTACK
 7. A BACK DOOR is instructionsm to bypass security control
 8. A __ is a technique that makes the internet appear legal - SPOOFING
 9. A __ is a hardware or software that protects resources from __ FIREWALL/ INSTRUSIONS
 10. __ is te use of the computer or network without permission - UNAURTHORIZED ACCESS
 11. __ is the use of a computer for unapproved activities - UNAURTHORIZED USE
 12. __ tells a persons true identity -  BIOMETRIC DEVICE
 13. __ is the dicovery , collection , and analysis of evidence found on computes and networks. - DIGITAL FORENSICS
 14. __ occurs when someone ilegall copies a program. - SOFTWARE THEFT
 15. __ occurs when someone steals confidential or person information . - INFOPRMATION THEFT
 16. Encryption is the proccess of converting data
 17. __ is an encrypted code that a person, website, organization attached to a message- DIGITAL SIGNATURE
 18. __ is a notice that guarentees a user that the website is real - DIGITAL CERTIFICATE
 19. A website that uses __ blank techniques to secure its data is known as a secure site. _ ENCRYPTION
 20. The act of stealing digital equipment is __ - HARDWARE THEFT
 21 . Is the act of destroying digital equipment __ - HARDWARE VANDILISM
 22.  __ is a duplicate of a file that can be used if original is lost of destroyed. - BACKUP
 23. __ of guidelines that govern the use of computers , mobile devices ... -  COMPUTER ETHICS
 24.  __ is the rights to which creators are intitled to their rights - INTELLECTUAL PROPERTY
 25. __ is written guidline that help demonstrate - CODE OF CONDUCT
 26.  __ is a plan designed to help prevent illegal distribution ... - DIGITAL RIGHT MANAGEMENT
 27. __ is the owners choice to let someone publish ... COPYRIGHT
 28. __ is a program that secretly collects information about the user - SPYWARE
 29. __ is a program that displays online advertisment - ADDWARE
 30. __ is gaining unaurthorized access .. SOCIAL ENGINEERING
 31. Green computing - reducing the amount of electricity used when online.
 32. Right of individual and companies to deny or restrict the collection of useful information about them ... - INFORMATION PRIVACY
 33. __ small text file that a webserver stores on your computer - COOKIE
 34. __ allows the use of computers , mobile devices... - EMPLOYEE MONITORING

Tuesday, January 27, 2015

Starting Fresh Spring Semester

This spring semester 2015 I i want to start fresh . Having a new outlook on life and school , and bettering myself and gaining a better education is my ultimate goal .