550 likes | 840 Views
COMPUTER CONCEPTS Vocabulary. Chapter 9 Data Security. Operator error . A mistake made by a computer user. . Power failure . A complete loss of power to the computer system. . Power spike . A sudden increase of power that lasts less than a millionth of a second. . Power surge .
E N D
COMPUTER CONCEPTSVocabulary Chapter 9 Data Security CIS 120
Operator error • A mistake made by a computer user. CIS 120
Power failure • A complete loss of power to the computer system. CIS 120
Power spike • A sudden increase of power that lasts less than a millionth of a second. CIS 120
Power surge • A sudden increase of power that can last several seconds. CIS 120
UPS (uninterruptible power supply) • A device that contains a battery to provide a continuous supply of power to a computer system in case of a power failure and contains circuitry to protect a computer from power spikes and surges. CIS 120
MTBF (mean time between failures) • A measurement of reliability that is applied to computer components. MTBF is derived by dividing the number of failures in test equipment by the total time they were tested. CIS 120
Power strip • A device that provides multiple outlets, but no protection for power surges and spikes. CIS 120
Surge strip • A device that protects computer equipment from electrical spikes and surges (also called a surge suppressor or surge protector). CIS 120
Crackers • People who break into a computer system with intent to damage files or steal data. CIS 120
Cyberpunks • People who break into computers, especially Internet computers, to steal data, modify files, or plant viruses. CIS 120
Hackers • The term "hacker” once meant a computer hobbyist and has also been used to describe a computer novice. In most contexts today, it means a person who has gained illegal access into a computer system. CIS 120
Computer virus • A program designed to attach itself to a file, reproduce, and spread from one file to another, destroying data, displaying an irritating message, or otherwise disrupting computer operations. CIS 120
File virus • A computer virus that infects executable files, that is programs with exe filename extensions. CIS 120
Payload • The disruptive instructions or message delivered by a computer virus. Payloads can range from just being annoying to destroying data and files on a computer system. CIS 120
Boot sector virus • A computer virus that infects the sectors on a disk that contain the data a computer uses during the boot process. The virus spreads every time the infected disk is in the computer when it boots. CIS 120
Macro • A small set of instructions that automate a task. Typically, a macro is created by performing the task once and recording the steps. Whenever the macro is played back, the steps are repeated. CIS 120
Macro virus • A computer virus that infects the macros that are attached to documents and spreadsheets. CIS 120
Trojan horse • A computer program that appears to perform one function while actually doing something else, such as inserting a virus into a computer system or stealing a password. CIS 120
Logic bomb • A computer program that is triggered by the appearance or disappearance of specific data (for example, when the word "terminated" appears in an employee's record or when a pass- word begins with the letters "DB"). CIS 120
Time bomb • A type of computer program that stays in a computer system undetected until it is triggered at a certain date or time. CIS 120
Y2K bug • A time bomb unintentionally created by programmers when they wrote programs that used a two-digit field for the year, with the result that computers will read the digits 00 as 1900 rather than as 2000. CIS 120
Worm • A software program designed to enter a computer system, usually a network, through security "holes" and replicate itself. CIS 120
Antivirus software • A computer program used to scan a computer's memory and disks to identify, isolate, and eliminate viruses. CIS 120
Checksum • A value, calculated by combining all the bytes in a file, that is used by virus detection programs to identify whether any bytes have been altered. CIS 120
Virus signature • The unique computer code contained in a virus that helps in its identification. Antivirus software searches for known virus signatures to identify a virus. CIS 120
Data security • Techniques that provide protection for data. CIS 120
Risk management • The process of weighing threats to computer data against the expendability of that data and the cost of protecting it. CIS 120
Acceptable use policy • A set of rules and regulations that specify how a computer system should be used and set the penalties for misuse. CIS 120
End-user procedures • A set of formalized steps that a person must follow to perform a computing task. CIS 120
Biometrics • Biological measurements, such as fingerprinting, that are used in the context of computers to verify a person's identity. CIS 120
Trap door • A way to bypass the normal security precautions and enter a computer system. A trap door is often created during computer installation and testing, but should be removed before the computer is placed into service. CIS 120
User rights • Rules that specify the directories and files that an individual user can access. CIS 120
Encryption • The process of scrambling or hiding information so that it cannot be understood with- out the key necessary to change it back into its original form. CIS 120
Key • In the context of data encryption, a key is the method used to encrypt or decipher information as in which numbers in a code match each letter of the alphabet. CIS 120
Pretty Good Privacy (PGP) • A popular public key encryption system. CIS 120
Public key encryption (PKE) • An encryption method that uses a pair of keys, a public key (known to everyone) that encrypts the message, and a private key (known only to the recipient) that decrypts it. CIS 120
Digital certificate • A security method that identifies the author of an ActiveX control. A computer programmer can "sign" a digital certificate after being approved. CIS 120
Firewall • A method for preventing hostile pro- grams, such as Java applets, from entering a network, usually by installing firewall software that filters out suspicious packets. CIS 120
Java applet • Small programs that add processing and interactive capabilities to Web pages. CIS 120
Sandbox • A metaphor for the limited areas and equipment that a Java applet can access on a computer. CIS 120
Cookie • A message sent from a Web server to a browser and stored on a user's hard disk, usually containing information about the user. CIS 120
S-HTTP (Secure HTTP) • A method of encrypting data transmitted between a computer and a Web server by encrypting individual packets of data as they are transmitted. CIS 120
SSL (Secure Sockets Layer) • A security protocol that uses encryption to establish a secure connection between a computer and a Web server. CIS 120
Downtime • Time during which a computer system is not functioning. CIS 120
Hardware redundancy • Maintaining equipment that duplicates the functions of equipment critical to computing activities. CIS 120
Backup • A backup is a duplicate copy of a file, disk, or tape. Also refers to a Windows utility that allows you to create and restore backups. CIS 120
Copy disk • A utility program that duplicates the contents of an entire floppy disk. CIS 120
Copy utility • A program that copies one or more files. CIS 120
Backup software • The software used to specify the folders and files that should be included when making a backup of hard disk data. CIS 120