Test 2 Study Guide
CHAPTER 5 TERMS:
• Digital Security Risk: Any event or action that could cause a loss of or damage to a
computer or mobile device hardware, software, data, information, or processing
• Types of People Committing Crimes: Hackers, Crackers, Script Kiddies, Corporate spies,
Unethical employees, Cyberextortionist, Cyberterrorist.
• Malware: Short for malicious software, consists of programs that act without a user’s
knowledge and deliberately alter the operations of computers and mobile devices.
• Spoofing: A technique intruders use to make their network or Internet transmission
• Denial of Service Attack (DoS attack): Disrupts computer access to an Internet Service.
• Back Door: A program or set of instructions in a program that allow users to bypass
• Botnet: A group of compromised computers or mobile devises connected to a network.
• Firewall: Hardware and/or software that protects a network’s resources from intrusion.
• Unauthorized Access: The use of a computer or network without permission.
• Unauthorized Use: The use of a computer or its data for unapproved or possibly illegal
• PIN: (Personal Identification Number) sometimes called a passcode, is a numeric
password, either assigned by a company or selected by a user.
• Biometric Device: Authenticates a person’s identity by translating a personal
characteristic into a digital code that is compared with a digital code in a computer or
mobile device verifying a physical or behavioral characteristic.
• Digital Forensics: The discovery, collection and analysis of evidence found on computers
• Product Activation: Conducted either online or by phone, users provide the software
product’s identification number to associate the software with the computer or mobile
device on which the software is installed.
• Information Theft: Occurs when someone steals personal or confidential information. • Encryption: A process of converting data that is readable by humans into encoded
characters to prevent unauthorized access.
• Secure Site: A website that uses encryption to secure data.
• Backup: A duplicate of a file, program, or media that can be used if the original is lost,
damaged, or destroyed.
• Technology Ethics: The moral guidelines that govern the use of computers, mobile