MIS 2223 Midterm: Test 2 Study Guide Part 1

3 Pages
Unlock Document

East Carolina University
Management Information Systems
MIS 2223
Kevin Fontana

Test 2 Study Guide CHAPTER 5 TERMS: • Digital Security Risk: Any event or action that could cause a loss of or damage to a computer or mobile device hardware, software, data, information, or processing capability. • Types of People Committing Crimes: Hackers, Crackers, Script Kiddies, Corporate spies, Unethical employees, Cyberextortionist, Cyberterrorist. • Malware: Short for malicious software, consists of programs that act without a user’s knowledge and deliberately alter the operations of computers and mobile devices. • Spoofing: A technique intruders use to make their network or Internet transmission appear legitimate. • Denial of Service Attack (DoS attack): Disrupts computer access to an Internet Service. • Back Door: A program or set of instructions in a program that allow users to bypass security controls. • Botnet: A group of compromised computers or mobile devises connected to a network. • Firewall: Hardware and/or software that protects a network’s resources from intrusion. • Unauthorized Access: The use of a computer or network without permission. • Unauthorized Use: The use of a computer or its data for unapproved or possibly illegal activities. • PIN: (Personal Identification Number) sometimes called a passcode, is a numeric password, either assigned by a company or selected by a user. • Biometric Device: Authenticates a person’s identity by translating a personal characteristic into a digital code that is compared with a digital code in a computer or mobile device verifying a physical or behavioral characteristic. • Digital Forensics: The discovery, collection and analysis of evidence found on computers and networks. • Product Activation: Conducted either online or by phone, users provide the software product’s identification number to associate the software with the computer or mobile device on which the software is installed. • Information Theft: Occurs when someone steals personal or confidential information. • Encryption: A process of converting data that is readable by humans into encoded characters to prevent unauthorized access. • Secure Site: A website that uses encryption to secure data. • Backup: A duplicate of a file, program, or media that can be used if the original is lost, damaged, or destroyed. • Technology Ethics: The moral guidelines that govern the use of computers, mobile
More Less

Related notes for MIS 2223

Log In


Don't have an account?

Join OneClass

Access over 10 million pages of study
documents for 1.3 million courses.

Sign up

Join to view


By registering, I agree to the Terms and Privacy Policies
Already have an account?
Just a few more details

So we can recommend you notes for your school.

Reset Password

Please enter below the email address you registered with and we will send you a link to reset your password.

Add your courses

Get notes from the top students in your class.