You are on page 1of 8

Computer Security - Everything and security

Study online at quizlet.com/_5m5789

1. Access 4. Authentication
Points -
APs

a device, such as a wireless router, that allows the process of determining whether someone
wireless devices to connect to a network. Most or something is, in fact, who or what it is
of them have built-in routers, while others must declared to be.
be connected to a router in order to provide
5. blog
network access. Due to limited range, several of
them are needed to permit uninterrupted
wireless communication. Example in airports.
2. ad-ware

is an online journal or diary where writers,


is software that loads itself onto a computer and known as bloggers, may chronicle their daily
tracks the user's browsing habits or pops up lives or comment on news and popular
advertisements while the computer is in use. culture.
Applications that send data to advertisers.
6. Bluetooth
3. attachment

is an example of WPAN technology. Spread


spectrum transmission (radio waves) is sued
to provide wireless links between mobile
phones, computers and handheld devices.

A file that can be added to an e-mail, like a


document, photograph, or song. Sometimes
attachments carry viruses, so do not open
attachments from unknown parties.
7. bookmark 11. cookie

A way to quickly access a favorite website by Websites use these files to store information
saving it in your browser on your browser, such as log-in or
registration identification, user preferences,
8. Bridge
and online "shopping-cart" information. Your
browser saves the information and reuses it
when you return to those websites. You can
refuse to accept them or erase all of them
saved on your browser.
12. cyberbullying

is a network device that connect one LAN to


another LAN that uses the same protocol.
9. browser

Bullying through Internet applications and


technologies such as instant messaging (IM),
social networking sites, and cell phones.
13. download

A program that allows users to view Web pages.


Mozilla® Foxfire and Microsoft® Internet Explorer
are examples of popular it.
10. chat
room

Information retrieved from the Internet, discs


or CDs, and other computers which you can
use or save to your computer.

An interactive forum where you can talk in real-


time. It is the place or location online where the
chat is taking place. Many of these are
established so that people can discuss a
common interest like music or movies.
14. email 17. Files
Server

server that allows users to save and load


data/files.
18. firewall

A service that allows people to send messages


with pictures and sounds from their computer to
any other computer in the world. To send
someone an ______ message you need an ______
account and to know the other person's ______
address.
15. Encryption

This is a system that creates a special "wall" to keep


out unwanted information, like spam and viruses,
and unwanted people, like hackers.

is the most effective way to achieve data 19. hacker


security. Encrypted data is referred to as cipher
text.
16. Encryption
-
Encryption

A popular term for someone who accesses


computer information either legally or illegally.
20. history
..is the conversion of electronic data into
another form, called ciphertext, which cannot be
easily understood by anyone except authorized
parties. A decryption software or a decryption
key is needed to read the text.

A list of websites the people using a particular


computer have visited. Check your children's
website ______ to see what sites they have visited
21. Internet 25. LAN -
Local
Area
Network

a global network connecting millions of


computers. More than 190 countries are linked into
..is usually within a one building or certainly not
exchanges of data, news and opinions.
cover a large geographical area. It would
22. Intranet consist of a number of computers and
devices(e.g printers) which will be connected
through switches/hubs.
26. malware

software designed to infiltrate or damage a


computer system without the owner's informed
consent.

a private network accessible only to an 27. netiquette


organization's staff. Generally a wide range of
information and services from the organization's
internal IT systems are available that would not be
available to the public from the Internet.
23. ISP

Courtesy, honesty, and polite behavior practiced


on the Internet
28. Network

Internet Service Provider


24. LAN

a group of two or more computer systems


linked together. There are many types of them,
including the following: local-area networks
(LANs): The computers are geographically close
together (that is, in the same building).

Local Area Network


29. Network 32. piracy
security

...consists of the policies adopted to prevent and Illegally copying copyrighted software, music, or
monitor unauthorized access, misuse, movies
modification, or denial of a computer network
and network-accessible resources. It involves the 33. Printer
authorization of access to data in a network, servers
which is controlled by the network administrator.
30. pharming

a software application, network device or computer


that manages print requests and makes printer
queue status.
An online scam that attacks the browser's address
bar. Users type in what they think is a valid 34. Proxy
website address and are unknowingly redirected server
to an illegitimate site that steals their personal
information.
31. phishing

a dedicated computer or a software system running


on a computer that acts as an intermediary between
an endpoint device, such as a computer, and
another server from which a user or client is
requesting a service. It may exist in the same
machine as a firewall server or it may be on a
An online scam that uses e-mail to "fish" for users' separate server, which forwards requests through
private information by imitating legitimate the firewall.
companies.
35. Router 38. spam

a device that forwards data packets along


Unwanted e-mail from someone you don't know. It is
networks. It is connected to at least two
usually trying to sell you something
networks, commonly two LANs or WANs or a
LAN and its ISP's network. they are located at 39. spy-
gateways, the places where two or more ware
networks connect.
36. Server

a bad side effect of free down loads with it, some


one can watch everything your doing and steal your
ID.
A computer or device on a network that
manages network resources. Example: File ______ 40. Switch
- a computer and storage device dedicated to
storing files. Any user on the network can store
files on the ______. (studenthome drives,
common2016
Print ______: a computer that manages one or
more printers, and a network ______ is a computer
that manages network traffic.
Database ______: a computer system that
processes database queries. a network device that connects devices together on
a computer network, by using packet switching to
37. social
receive, process and forward data to the destination
networking
device.
site
41. Trojan
horse

An online community where people from all


over the world may meet and share common
interests. These sites allow members to set up a
profile, which may include information such as
name, location, phone number, age, and gender
a type of malware designed to provide
unauthorized, remote access to a user's computer. It
does not have the ability to replicate themselves like
viruses; however, they can lead to viruses being
installed on a machine.
42. types of 46. Wifi
authentication
used by
banks

PIN/Passwords, bankcard, your fingerprints.


43. virus
uses radio frequency technology to enable the
device to send and receive signals.
47. Wifi -
Wireless
Fidelity

A computer program that can destroy files it is a trademark name for the any product which
or make your computer "crash." is based on the IEEE 802.11 standard.
44. WAN 48. WLANS

Wireless Local Area Network


49. worm
Wide Area Network
45. WAN - Wide a telecommunications network or computer
Area Network network that extends over a large
geographical distance. They are often
established with leased telecommunication
circuits.

a software program capable of reproducing itself


that can spread from one computer to the next
over a network.
50. WPAN

Wireless Personal Area Networking

You might also like