New Beginnings
Tuesday, February 10, 2015
Chapter 5
1 . Digital security Risk - event or action that can cause loss or damage
2. An illegal act involving the use of computer or related devices is referred to as .. - COMPUTERCRIME
3 . __ is an online or internet basd illegal act - CYBERCRIME
4 . Malware
5. A __ is a group computers connected to a network - BOTNET
6. A __ disrupts computer access to internet services - DOS ATTACK
7. A BACK DOOR is instructionsm to bypass security control
8. A __ is a technique that makes the internet appear legal - SPOOFING
9. A __ is a hardware or software that protects resources from __ FIREWALL/ INSTRUSIONS
10. __ is te use of the computer or network without permission - UNAURTHORIZED ACCESS
11. __ is the use of a computer for unapproved activities - UNAURTHORIZED USE
12. __ tells a persons true identity - BIOMETRIC DEVICE
13. __ is the dicovery , collection , and analysis of evidence found on computes and networks. - DIGITAL FORENSICS
14. __ occurs when someone ilegall copies a program. - SOFTWARE THEFT
15. __ occurs when someone steals confidential or person information . - INFOPRMATION THEFT
16. Encryption is the proccess of converting data
17. __ is an encrypted code that a person, website, organization attached to a message- DIGITAL SIGNATURE
18. __ is a notice that guarentees a user that the website is real - DIGITAL CERTIFICATE
19. A website that uses __ blank techniques to secure its data is known as a secure site. _ ENCRYPTION
20. The act of stealing digital equipment is __ - HARDWARE THEFT
21 . Is the act of destroying digital equipment __ - HARDWARE VANDILISM
22. __ is a duplicate of a file that can be used if original is lost of destroyed. - BACKUP
23. __ of guidelines that govern the use of computers , mobile devices ... - COMPUTER ETHICS
24. __ is the rights to which creators are intitled to their rights - INTELLECTUAL PROPERTY
25. __ is written guidline that help demonstrate - CODE OF CONDUCT
26. __ is a plan designed to help prevent illegal distribution ... - DIGITAL RIGHT MANAGEMENT
27. __ is the owners choice to let someone publish ... COPYRIGHT
28. __ is a program that secretly collects information about the user - SPYWARE
29. __ is a program that displays online advertisment - ADDWARE
30. __ is gaining unaurthorized access .. SOCIAL ENGINEERING
31. Green computing - reducing the amount of electricity used when online.
32. Right of individual and companies to deny or restrict the collection of useful information about them ... - INFORMATION PRIVACY
33. __ small text file that a webserver stores on your computer - COOKIE
34. __ allows the use of computers , mobile devices... - EMPLOYEE MONITORING
2. An illegal act involving the use of computer or related devices is referred to as .. - COMPUTERCRIME
3 . __ is an online or internet basd illegal act - CYBERCRIME
4 . Malware
5. A __ is a group computers connected to a network - BOTNET
6. A __ disrupts computer access to internet services - DOS ATTACK
7. A BACK DOOR is instructionsm to bypass security control
8. A __ is a technique that makes the internet appear legal - SPOOFING
9. A __ is a hardware or software that protects resources from __ FIREWALL/ INSTRUSIONS
10. __ is te use of the computer or network without permission - UNAURTHORIZED ACCESS
11. __ is the use of a computer for unapproved activities - UNAURTHORIZED USE
12. __ tells a persons true identity - BIOMETRIC DEVICE
13. __ is the dicovery , collection , and analysis of evidence found on computes and networks. - DIGITAL FORENSICS
14. __ occurs when someone ilegall copies a program. - SOFTWARE THEFT
15. __ occurs when someone steals confidential or person information . - INFOPRMATION THEFT
16. Encryption is the proccess of converting data
17. __ is an encrypted code that a person, website, organization attached to a message- DIGITAL SIGNATURE
18. __ is a notice that guarentees a user that the website is real - DIGITAL CERTIFICATE
19. A website that uses __ blank techniques to secure its data is known as a secure site. _ ENCRYPTION
20. The act of stealing digital equipment is __ - HARDWARE THEFT
21 . Is the act of destroying digital equipment __ - HARDWARE VANDILISM
22. __ is a duplicate of a file that can be used if original is lost of destroyed. - BACKUP
23. __ of guidelines that govern the use of computers , mobile devices ... - COMPUTER ETHICS
24. __ is the rights to which creators are intitled to their rights - INTELLECTUAL PROPERTY
25. __ is written guidline that help demonstrate - CODE OF CONDUCT
26. __ is a plan designed to help prevent illegal distribution ... - DIGITAL RIGHT MANAGEMENT
27. __ is the owners choice to let someone publish ... COPYRIGHT
28. __ is a program that secretly collects information about the user - SPYWARE
29. __ is a program that displays online advertisment - ADDWARE
30. __ is gaining unaurthorized access .. SOCIAL ENGINEERING
31. Green computing - reducing the amount of electricity used when online.
32. Right of individual and companies to deny or restrict the collection of useful information about them ... - INFORMATION PRIVACY
33. __ small text file that a webserver stores on your computer - COOKIE
34. __ allows the use of computers , mobile devices... - EMPLOYEE MONITORING
Tuesday, January 27, 2015
Starting Fresh Spring Semester
This spring semester 2015 I i want to start fresh . Having a new outlook on life and school , and bettering myself and gaining a better education is my ultimate goal .
Subscribe to:
Posts (Atom)