This site is 100% ad supported. Please add an exception to adblock for this site.

MIS Chapter 9 terms

Terms

undefined, object
copy deck
the practice of talking a critical computer password out of an individual
Social Engineering-
Searching through the garbage for important pieces of information that can help crack an organization’s computers or be used to convince someone at he company to give access to the computers
Dumpster Diving-
a crime in which an imposter obtains key pieces of personal identification information, such as social security or driver’s license numbers, to impersonate someone else to obtain credit, merchandise, and services in the name of the victim or to provide
Identity theft-
a person who enjoys computer technology and spends time learning and using computer systems
Hacker-
a computer savvy person who attempts to gain unauthorized or illegal access to computer systems
Criminal hacker (cracker) -
a program that attaches itself to other programs
Virus-
an independent program that replicates is own program files until it interrupts the operation of networks and computer systems
Worm-
an application or system virus designed to “explode” or execute at a specified time and date
Logic bomb-
a program that appears to be useful but actually masks a destructive program
Trojan horse-
a small program hidden in a network or a computer system that records identification numbers and passwords
Password sniffer-
the act of illegally duplicating software
Software piracy-
illegally gaining access to and using the internet
Internet piracy-
a means to enable users of an insecure public networks such a the internet to securely and privately exchange data through the use of a public and a private cryptographic key pair that is obtained and shared through a trusted authority
Public key infra-structure (PKI) –
the measurement of a living trait, whether physical or behavioral
Biometrics-
programs or utilities that prevent viruses and recover from them if they infect a computer
Antivirus programs-
security system that monitors IS and network resources and notifies security personnel when it senses a possible break-in
Intrusion detection system (IDS) –
an organization that monitors and maintains network security hardware and software for its client companies
Managed security service provider (MSSP) –
system to protect individuals from harmful or objectionable internet content while safeguarding the free-speech rights of others
ICRA rating system-
a screening technology that shields users from Web sites that don’t provides the level of privacy protection they desire
Platform for Privacy Preferences (P3P) –
an injury that can be caused by working with computer keyboards and other equipment
Repetitive motion disorder or repetitive stress injury (RSI) –
the aggravation of the pathway for nerves that travel through the wrist (the carpel tunnel)
Carpal tunnel syndrome (CTS) –
the study of designing and positioning computer equipment for employee health and safety
Ergonomics-

Deck Info

22

permalink