Unformatted text preview:

Vocabulary1. Adware: A program that downloads on your computer when you install a freeware program, game, or utility. Generally, adware enables sponsored advertisements to appear in a section of your browser window or as a pop-up ad box. 2. Antivirus software: Software that is specifically designed to detect viruses and protect a computer and files from harm. 3. Backdoor program: A program that enables a hacker to take complete controlof a computer without the legitimate user’s knowledge or permission. 4. Backup: A backup is a copy of computer files that you can use to replace the originals if they are lost or damaged. 5. Biometric authentication device: A device that uses some unique characteristic of human biology to identify authorized users. 6. Black-hat hacker: A hacker who uses his knowledge to destroy information or for illegal gain. 7. Boot-sector virus: A virus that replicates itself into the master boot record of a flash drive or hard drive. 8. Botnet: A large group of software applications (called robots or bots) that runs without user intervention on a large number of computers. 9. Computer forensics: The application of computer systems and techniques to gather potential legal evidence; a law enforcement specialty used to fight high-tech crime. 10.Cookie: A small text file that some Web sites automatically store on a client computer’s hard drive when a user visits the site. 11.Cybercrime: Any criminal action perpetrated primarily through the use of a computer. 12.Cybercriminal: An individual who uses computers, networks, and the Internet to perpetrate crime. 13.Cyberloafing: Doing anything with a computer that is unrelated to a job (such as playing video games), while one is supposed to be working. Also called cyberslacking. 14.Data breach: When sensitive or confidential information is copied, transmitted, or viewed by an individual who was never authorized to handle the data. 15.Data file: File that contains stored data. 16.Denial-of-service (DoS) attack: An attack that occurs when legitimate users are denied access to a computer system because a hacker is repeatedly making requests of that computer system that tie up its resources and deny legitimate users access. 17.Distributed denial of service (DDoS) attack: An automated attack that is launched from more than one zombie computer at the same time. 18.Drive-by download: The use of malicious software to attack your computer bydownloading harmful programs onto your computer, without your knowledge,while you are surfing a Web site. 19.E-mail virus: A virus transmitted by e-mail that often uses the address book inthe victim’s e-mail system to distribute itself.20.Encryption virus: A malicious program that searches for common data files and compresses them into a file using a complex encryption key, thereby rendering the files unusable. 21.Firewall : A software program or hardware device designed to prevent unauthorized access to computers or networks. 22.Geotag: Data attached to a photograph that indicate the latitude and longitude where you were standing when you took the photo. 23.Grey hat hackers: A cross between black and white—they will often illegally break into systems merely to flaunt their expertise to the administrator of thesystem they penetrated or to attempt to sell their services in repairing security breaches. 24.Hacker: Anyone who unlawfully breaks into a computer system (whether an individual computer or a network). 25.Hoax: An e-mail message or Web site that contains information that is untrue,and is published with the purpose of deceiving others. 26.Identity theft: The process by which someone uses personal information about someone else (such as the victim’s name, address, and Social Security number) to assume the victim’s identity for the purpose of defrauding others.27.Image backup: A copy of an entire computer system, created for restoration purposes. 28.Incremental backup: A type of backup that only backs up files that have changed since the last time files were backed up. 29.Inoculation: A process used by antivirus software; compares old and current qualities of files to detect viral activity. 30.Internet Protocol address (IP address): The means by which all computers connected to the Internet identify each other. It consists of a unique set of four numbers separated by dots such as 123.45.178.91. 31.Keystroke logger: A type of spyware program that monitors keystrokes with the intent of stealing passwords, login IDs, or credit card information.32.Logic bomb: A computer virus that runs when a certain set of conditions is met, such as when specific dates are reached on the computer’s internal clock. 33.Logical port: A virtual communications gateway or path that enables a computer to organize requests for information (such as Web page downloads and e-mail routing) from other networks or computers. 34.Logical port blocking: A condition in which a firewall is configured to ignore allincoming packets that request access to a certain port so that no unwanted requests will get through to the computer. 35.Macro virus: A virus that is distributed by hiding it inside a macro. 36.Malware: Software that is intended to render a system temporarily or permanently useless or to penetrate a computer system completely for purposes of information gathering. Examples include spyware, viruses, worms, and Trojan horses. 37.Master boot record (MBR): A small program that runs whenever a computer boots up. 38.Multipartite virus: Literally meaning “multipart” virus; a type of computer virus that attempts to infect both the boot sector and executable files at the same time. 39.Network address translation (NAT): A process that firewalls use to assign internal Internet Protocol (IP) addresses on a network.40.Packet (data packet): A small segment of data that is bundled for sending over transmission media. Each packet contains the address of the computer or peripheral device to which it is being sent. 41.Packet analyzer (sniffer) : A computer hardware device or software program designed to detect and record digital information being transmitted over a network. 42.Packet filtering: A feature found in firewalls that filters out unwanted data packets sent to specific logical ports. 43.Personal firewall: A firewall specifically designed for home networks. 44.Pharming: Planting malicious code on a computer that alters the browser’s ability to find Web addresses and directs users to bogus Web


View Full Document

FSU CGS 2060 - Vocabulary

Documents in this Course
Notes

Notes

11 pages

CGS Quiz

CGS Quiz

12 pages

Notes

Notes

4 pages

QUIZ 8

QUIZ 8

3 pages

Chapter 1

Chapter 1

22 pages

EXAM 2

EXAM 2

9 pages

CHAPTER 7

CHAPTER 7

25 pages

QUIZ 1

QUIZ 1

3 pages

Chapter 7

Chapter 7

25 pages

Quizlet

Quizlet

2 pages

Notes

Notes

4 pages

Quiz #7

Quiz #7

24 pages

Notes

Notes

22 pages

QUIZ 10

QUIZ 10

3 pages

Chapter 1

Chapter 1

21 pages

CHAPTER 7

CHAPTER 7

25 pages

CHAPTER 7

CHAPTER 7

31 pages

Chapter 1

Chapter 1

22 pages

Exam 2

Exam 2

6 pages

Notes

Notes

25 pages

QUIZ 4

QUIZ 4

2 pages

QUIZ 3

QUIZ 3

2 pages

Exam 1

Exam 1

47 pages

QUIZ 11

QUIZ 11

3 pages

QUIZ 4

QUIZ 4

2 pages

QUIZ 7

QUIZ 7

3 pages

Quiz 7

Quiz 7

5 pages

Chapter 7

Chapter 7

20 pages

QUIZ 1

QUIZ 1

5 pages

QUIZ 9

QUIZ 9

2 pages

Chapter 7

Chapter 7

36 pages

Chapter 7

Chapter 7

29 pages

Chapter 1

Chapter 1

22 pages

QUIZ 2

QUIZ 2

3 pages

Quiz #1

Quiz #1

15 pages

Chapter 7

Chapter 7

21 pages

Test 1

Test 1

14 pages

Chapter 6

Chapter 6

19 pages

Quiz 1

Quiz 1

18 pages

Exam 2

Exam 2

19 pages

Test 2

Test 2

18 pages

Exam 2

Exam 2

8 pages

CHAPTER 5

CHAPTER 5

12 pages

MIDTERM

MIDTERM

35 pages

Exam 1

Exam 1

7 pages

Exam 2

Exam 2

22 pages

Exam 1

Exam 1

12 pages

Exam 1

Exam 1

7 pages

Exam 1

Exam 1

7 pages

Exam 2

Exam 2

19 pages

EXAM 1

EXAM 1

5 pages

Exam 2

Exam 2

3 pages

Exam 2

Exam 2

22 pages

Exam 2

Exam 2

6 pages

Exam 1

Exam 1

7 pages

Exam 2

Exam 2

19 pages

CHAPTER 5

CHAPTER 5

12 pages

Chapter 1

Chapter 1

40 pages

Exam 1

Exam 1

11 pages

Notes

Notes

30 pages

Load more
Download Vocabulary
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Vocabulary and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Vocabulary 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?