1 / 31

CIS 105 Survey of Computer Information Systems

CIS 105 Survey of Computer Information Systems. Essential Concepts and Terminology Study Unit 12. Computer Security Risk. . Any event, action, or situation that could lead to loss or destruction of computer systems or data. Computer Crime. .

noma
Download Presentation

CIS 105 Survey of Computer Information Systems

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CIS 105Survey of Computer Information Systems Essential Concepts and Terminology Study Unit 12

  2. Computer Security Risk. • Any event, action, or situation that could lead to loss or destruction of computer systems or data.

  3. Computer Crime. • Use of a computer in a manner that violates the law.

  4. Cybercrime. • Use of the Internet to carry out illegal activities.

  5. Authentication. • Regarding computer systems, those techniques used to control access.

  6. Packet Sniffer. • A program that examines all traffic on a section of network to find passwords, credit card numbers and other information of value.

  7. Social Engineering. • A form of deception designed to cause people to divulge sensitive information.

  8. Superuser Status. • A classification, in multi-user operating systems, enabling administrative access to virtually all files on a network.

  9. SATAN. • A security loophole analysis program designed for use by system administrators (and abused by electronic intruders) to detect insecure systems.

  10. Computer Virus. • A program designed to attach itself to a file, reproduce, and spread from one file to another, destroying data, displaying an irritating message, or otherwise disrupting computer operations.

  11. File Infector. • Computer viruses that attach to program files and spread when the program is executed.

  12. Boot Sector Virus. • A computer virus that infects the sectors on a disk that contain the data a computer uses during the boot process. This type of virus does not require a program to spread, and may cause the destruction of all data on a drive.

  13. Macro Virus. • A computer virus that infects the automatic command execution capabilities (macros) of productivity software. Macro viruses are typically attached to documents and spreadsheets.

  14. Executable File. • A file containing instructions capable of running on a computer, usually with an .exe extension if intended for use on a PC.

  15. Time Bomb (Logic Bomb). • A computer program (virus) designed to stay in a computer system undetected until it is triggered at a certain date or time, or by a certain event.

  16. Worm. • A program designed to enter a computer system, usually a network, and replicate itself. Worms can take control of resources to attack other computers.

  17. Trojan Horse. • A computer program that appears to perform a useful function while actually doing something malicious, such as inserting a virus, stealing a password, or destroying data.

  18. Hackers. • The term "hacker” once meant a computer hobbyist or a computer novice. In most contexts today, it means a person who has gained unauthorized access to a computer system.

  19. Crackers. • People who break into a computer system with intent to damage files or steal data, or who are driven to hack highly secure systems.

  20. Trap Door. • A means to bypass normal security precautions and enter a computer system. A trap door is often created during computer installation and testing, or for personal exploitation.

  21. Power Spike. • A sudden increase of power that lasts less than a millionth of a second.

  22. Power Surge. • A sudden increase of power that can last several seconds. Power surges can destroy electronic components.

  23. Uninterruptible Power Supply (UPS). • A battery-powered device that detects power outages and voltage drops, and automatically replaces the electrical supply source without interruption.

  24. Callback System. • A system to control access to a computer by verifying information and calling the person requesting access at a specified phone number.

  25. Tokens. • Handheld electronic devices, used to authenticate users, that generate logon codes, and that may provide digital certificates.

  26. Smartcards. • Credit card-sized devices with their own internal memory, often used to control access to computer networks.

  27. Biometric Authentication. • Biological measurements, such as fingerprinting, retinal scans, and voice or facial recognition, used to verify a person's identity.

  28. Firewall. • A program to prevent or limit external access to a computer from networked connections.

  29. Anti-Virus Software. • Computer programs used to scan computer memory and disks to identify, isolate, and eliminate viruses.

  30. Backup Software. • Programming used to periodically make a backup copy of specified hard disk data, to enable restoring lost material.

  31. End of Study Unit 12. Return to first slide Move to Study Unit 13 CIS 105 Home Page Created by James Q. Jacobs

More Related