Computer Security Risk
is any event or action that could cause a loss or damage to computer hardware, software, data, information or processing capability.
Computer crime
any illegal act involving a computer.
Cybercrime
refers to online or internet based illegal acts.
Hacker
refers to someone who accesses a computer or network illegally.
Cracker
is someone who accesses a computer or network illegally but has the intent of destroying data, stealing information or other malicious action.
Script kiddie
the same as cracker but does not have the technical skills and knowledge.
Corporate spy
has excellent computer and networking skills and are hired to break into a specific computer.
Unethical employees
break into their employers computers for a variety of reasons.
Cyberextortionist
is someone who uses email as a vehicle for extortion
Cyberterrorist
is someone who uses the internet or network to destroy or damage computers for political reasons.
Virus
damaging computer program that affects or infects a computer negatively by altering the way the computer works without the users knowledge or permission.
Worm
a program that copies itself repeatedly
Trojan horse
a program that hides within or looks like a legitimate program.
Rootkit
a program that hides in a computer and allows someone from a remote location to take full control of the computer.
Hardware theft
is the act of stealing computer equipment.
Botnet
is a group of compromised computers connected to a network such as the internet that are used as part of a network that attacks other networks usually for nefarious purposes.
Denial of service attack or DOS attack
attack is an assault whose purpose is to disrupt computer access to an Internet service such as the web or email.
Back door
Back door is a program or set of instructions in a program that allow users to bypass security controls when accessing a program, computer or network.
Spoofing
is a technique intruders use to make their network or internet transmission appear legitimate to a victim computer or network.
Hardware vandalism
is the act of defacing or destroying computer equipment.
Information theft
occurs when someone steals personal or confidential information.
encryption
is the process of converting readable data into unreadable characters to prevent unauthorized access.
System failure
is the prolonged malfunction of a computer.
surge protector
is a safeguard against system failure uses special electrical components to provide a stable current flow to the computer and other electronic equipment,
Firewall
is hardware /software that protects a networks resources from intrusion by users on another network.
Password
is a private combination of characters associated with the user name that allows access to certain computer resources.
Possessed objects
is any item that you must carry to gain access to a computer facility. Ex. Like badges, card, keys.
Personal identification number(PIN)
is a numeric password either assigned by a company or selected by a user.
Biometric devices
authenticates a persons identity by translating a personal characteristic such as finger.
Digital forensic
is the discovery, collection and analysis of evidence found on computers and network.
Repetitive strain injury (RSI)
is an injury or disorder of the muscles, nerves, tendons, ligaments and joints.
Computer vision syndrome (CVS)
related to eye effects when using computer
Computer ethics
is a moral guidelines that govern the use of computers and information system.
Intellectual property rights (IP)
are the rights to which creators are entitled for their work.
Green computing
involves reducing the electricity and environmental waste while using a computer.
Information privacy
refers to the right of individuals and companies to deny or restrict the collection and use of information about them.
Cookie
is a small text file that a web server stores on your computer.
Spyware
is a program placed on a computer without the users knowledge that secretly collects information about the user.
Adware
is a program that displays an online advertisement in a banner or pop up window on web pages, email message or other internet services.
Spam
is unsolicited email message or newsgroup posting sent to multiple recipients or newsgroups at once.
Phishing
is a scan in which a perpetrator sends an official looking email message that attempts to obtain your personal and financial information.
Social engineering
is gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naivety of other.