Académique Documents
Professionnel Documents
Culture Documents
5
Digital security risk
o Is any event or action that could cause a loss of or damage to
computer or mobile device hardware, software, data, information, or
processing capability.
Computer crime
o Any illegal act involving the use of a computer or related devices
generally
Cybercrime
o Refers to online or internet-based illegal acts such as distributing
malicious software or committing identity theft.
Hacker
o Has a derogatory meaning and refers to someone who accesses a
computer or network illegally.
Cracker
o Is someone who accesses a computer or network illegally but has the
intent of destroying data, stealing information, or other malicious
action.
Script kiddie
o Has the same intent as cracker but does not have the technical skills
and knowledge.
o Use prewritten hacking and cracking programs to break into computers
and networks
Cyberextortionist
o Is someone who demands payment to stop an attack on an
organizations technology infrastructure.
Cyberterrorist
o Is someone who uses the Internet or network to destroy or damage
computers for political reasons.
o Cyber warfare
Describes an attack whose goal ranges from disabling a
governments computer network to crippling a country.
Malware
o Short for malicious software
o Consists of programs that act without a users knowledge and
deliberately alter the operations of computers and mobile devices.
Payload
o Destructive event or prank, on a computer or mobile device in a
variety of ways, such as when a user opens an infected file, runs an
infect program, connects an unprotected computer or mobile device to
a network, or when a certain condition or event occurs, such as the
computers clock changing to a specific date.
Botnet
o Or also called zombie army
Secure site
o A website that uses encryption techniques to secure its data
o Web addresses of secure sites often begin with https instead of http
Backup
o Is a duplicate or a file, program, or media that can be used if the
original is lost, damaged or destroyed
Back up(with a space)
o A file means to make a copy of it.
Restore
o In case of system failure or the discovery of corrupted files, you restore
the files by copying the backed up files to their original location on the
computer or mobile device.
Grandparent
o Is the oldest copy of the file
Parent
o Is the second oldest copy of the file
Child
o Is the most recent copy of the file
Disaster recovery plan
o Is a written plan that describes the steps an organization would take to
restore its computer operations in the event of a disaster.
Computer ethics
o Are moral guidelines that govern the use of computers, mobile devices,
and devices, and information systems.
Intellectual property (IP)
o Refers to unique and original works such as ideas, inventions, art,
writerings, processes, company and product names, and logos.
Intellectual property rights
o Are the rights to which creators are entitles for their work.
Copyright
o Gives authors, artists, and other creators of original work exclusive
rights to duplicate, publish, and sell their materials.
Digital rights management (DRM)
o A strategy designed to prevent illegal distribution of movies, music,
and other digital content.
Code of conduct
o Is a written guideline that helps determine wheter a specification is
ethical/unethical or allowed/not allowed.
Green computing
o Involves reducing the electircy an environmental waste while using
computers, mobile devices, and related technologies.
Energy star program
o Helps reduce the amount of electricity used by computers and related
devices. Encourages manufactures to create energy-effacement
devices.
Power usage effectiveness (PUE)
Is a ratio that measures how much power enters the computer facility
or data center against the amount of power required to run the
computers and devices.
Information privacy
o Refers to the right of individuals and companies to deny or restrict the
collection, use, and dissemination of information about them.
Cookie
o Is a small text file that a web server stores on your computer
o Contains data about you, such as your user name, postal code, or
viewing preferences.
Phishing
o Is a sam in which a preparatory sends an official looking email
message that attempts to obtain your personal and/or financial
information.
Click jacking
o And object that can be clicked on a website, such as button, image, or
link, contains a malicious program.
Spyware
o Is a program place on a computer or mobile device without the users
knowledge that secretly collects information about the user and then
communicates the information it collects to some outside source while
the user is online.
Adware
o Is a program that displays an online advertisement in a banner or popup window on webpages, email messages, or other internet services.
o Mad ware
Is adware on mobile phones
Social engineering
o Is defined as gaining unauthorized access to or obtaining confidential
information by taking advantage of the trusting human nature of some
victims and the naivety of others.
Employee monitoring
o Involves the use of computers, mobile devices, or cameras to observe,
record, and review an employees use of a technology, including
communications such as email messages, keyboard activity (used to
measure productivity), and websites visited.
Content filtering
o Is the process of restricting access to certain material.
o Use content filtering to limit employees web access.
Web filtering software
o Is a program that restricts access to specified websites.
o