Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
42 Cards in this Set
- Front
- Back
first type of computer crime |
illegal act perpetrated against computers or telecommunications, such as hardware theft |
|
second type of computer crime |
use of computers or telecommunications to accomplish an illegal act, such as identity theft |
|
evil twin attack |
an evil doer sets up a Wi-Fi hot spot that your computer thinks offers safe access to a secure public network and then monitors your communications and steals data you input |
|
security |
a system of safegaurds for protecting information technology against disasters, system failures, and unauthorized access that can result in damage or loss |
|
biometrics |
the science of measuring individual body characteristics |
|
encryption |
the process of altering readable data into unreadable form to prevent unauthorized access |
|
disaster-recovery plan |
a method of restoring information-processing operations that have been halted by destruction or accident |
|
cyberwarfare |
warfare involving computers and the Internet in which one nation attacks another's information systems
|
|
database |
a collection of interrelated data and files |
|
data storage hierarchy |
levels of data stored in a computer database: bits, characters (bytes), fields, records, and tables (files) |
|
character (byte) |
a letter, number, or special character |
|
field |
unit or category of data consisting of one or more characters (bytes) |
|
record |
collection of related fields |
|
file |
collection of related records |
|
database management system (DBMS) |
software written specifically to control the structure of a database and access to the data |
|
data dictionary |
a document or file that stores the data definitions and descriptions of the structure of data used in the databse |
|
metadata |
data that describes other data |
|
DBMS utilities |
programs that allow you to maintain the database by creating, editing, and deleting data, records, and files |
|
report generator |
a program for producing an on-screen or printed document form all or part of a database |
|
database administrator (DBA) |
coordinates all related activities and needs for an organization's database |
|
relational database |
relates, or connects, data in different tables of rows and columns through the use of primary keys, or common data elements |
|
structured query language (SQL) |
standard query language used to create, modify, maintain, and query relational databases |
|
query by example (QBE) |
the user asks for information in a database by using a sample record form, or table, to define the qualifications he or she wants for selected records |
|
object-oriented database |
uses "objects", software written in small, reusable chunks, as elements within database files |
|
multidimensional database (MDB) |
models data as facts, dimensions, or numerical measure for use in the interactive analysis of large amounts of data for decision-making purposes |
|
data mining (DM) |
the computer-assisted process of sifting through and analyzing vast amounts of data in order to extract hidden patterns and meaning and to discover new knowledge |
|
data warehouse |
a special database of cleaned-up data and metadata |
|
cyberattacks |
attempts to gain unauthorized access to or to disrupt or damage a computer system or electronic communications network |
|
troll |
a person who posts intentionally offensive, incendiary, or off-topic comments online |
|
hacker |
a person who gains unauthorized access to computers or networks |
|
crackers |
people who break into computers for destructive purposes |
|
denial-of-service (DoS) attack |
making repeated requests of a computer system or network, thereby overloading it and denying legitimate users access to it |
|
worms |
program that copies itself repeatedly into a computer's memory or onto a disk or flash drive or USB device |
|
trojan horse |
a program that pretends to be a useful program, usually free, such as a game or screen saver, but carries viruses, or destructive instructions, that perpetrate mischief without your knowledge |
|
rootkit |
a secret software program installed in a computer's operating system that someone in another location can use to take control of the computer |
|
blended threats |
use multiple techniques to attack a computer systems |
|
zombie |
computer taken over covertly and programmed to respond to instructions sent remotely |
|
botnet |
a network of computers in which each computer has been implanted with instructions to wait for commands from the person controlling the botnet |
|
privacy |
the right of people not to reveal information about themselves |
|
identity (ID) theft |
a crime in which thieves hijack your name and identity and use your information and credit rating to get cash or buy things |
|
database software |
a program that sets up and controls the structure of a database and access to the data |
|
key |
field used to sort data |