IT Fundametntals Manage Computing Securely, Safely and Ethically

Computer Security Risk

is any event or action that could cause a loss or damage to computer hardware, software, data, information or processing capability.

Computer crime

any illegal act involving a computer.

Cybercrime

refers to online or internet based illegal acts.

Hacker

refers to someone who accesses a computer or network illegally.

Cracker

is someone who accesses a computer or network illegally but has the intent of destroying data, stealing information or other malicious action.

Script kiddie

the same as cracker but does not have the technical skills and knowledge.

Corporate spy

has excellent computer and networking skills and are hired to break into a specific computer.

Unethical employees

break into their employers computers for a variety of reasons.

Cyberextortionist

is someone who uses email as a vehicle for extortion

Cyberterrorist

is someone who uses the internet or network to destroy or damage computers for political reasons.

Virus

damaging computer program that affects or infects a computer negatively by altering the way the computer works without the users knowledge or permission.

Worm

a program that copies itself repeatedly

Trojan horse

a program that hides within or looks like a legitimate program.

Rootkit

a program that hides in a computer and allows someone from a remote location to take full control of the computer.

Hardware theft

is the act of stealing computer equipment.

Botnet

is a group of compromised computers connected to a network such as the internet that are used as part of a network that attacks other networks usually for nefarious purposes.

Denial of service attack or DOS attack

attack is an assault whose purpose is to disrupt computer access to an Internet service such as the web or email.

Back door

Back door is a program or set of instructions in a program that allow users to bypass security controls when accessing a program, computer or network.

Spoofing

is a technique intruders use to make their network or internet transmission appear legitimate to a victim computer or network.

Hardware vandalism

is the act of defacing or destroying computer equipment.

Information theft

occurs when someone steals personal or confidential information.

encryption

is the process of converting readable data into unreadable characters to prevent unauthorized access.

System failure

is the prolonged malfunction of a computer.

surge protector

is a safeguard against system failure uses special electrical components to provide a stable current flow to the computer and other electronic equipment,

Firewall

is hardware /software that protects a networks resources from intrusion by users on another network.

Password

is a private combination of characters associated with the user name that allows access to certain computer resources.

Possessed objects

is any item that you must carry to gain access to a computer facility. Ex. Like badges, card, keys.

Personal identification number(PIN)

is a numeric password either assigned by a company or selected by a user.

Biometric devices

authenticates a persons identity by translating a personal characteristic such as finger.

Digital forensic

is the discovery, collection and analysis of evidence found on computers and network.

Repetitive strain injury (RSI)

is an injury or disorder of the muscles, nerves, tendons, ligaments and joints.

Computer vision syndrome (CVS)

related to eye effects when using computer

Computer ethics

is a moral guidelines that govern the use of computers and information system.

Intellectual property rights (IP)

are the rights to which creators are entitled for their work.

Green computing

involves reducing the electricity and environmental waste while using a computer.

Information privacy

refers to the right of individuals and companies to deny or restrict the collection and use of information about them.

Cookie

is a small text file that a web server stores on your computer.

Spyware

is a program placed on a computer without the users knowledge that secretly collects information about the user.

Adware

is a program that displays an online advertisement in a banner or pop up window on web pages, email message or other internet services.

Spam

is unsolicited email message or newsgroup posting sent to multiple recipients or newsgroups at once.

Phishing

is a scan in which a perpetrator sends an official looking email message that attempts to obtain your personal and financial information.

Social engineering

is gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naivety of other.