When an individual gains access to a computer or computer resource without permission. Unauthorized Access ISDS 1100 Final Exam Review Using a computer resource for unapproved activities. Unauthorized use ISDS 1100 Final Exam Review Organizations typically use this to explain acceptable computer use to their authorized users. Code of Conduct ISDS 1100 Final Exam Review The act of breaking into a remote computer system, often via the Internet or a wireless network. Hacking ISDS 1100 Final Exam Review The person doing the hacking. Hacker ISDS 1100 Final Exam Review These networks are inherently less secure than wired networks, so interception is easier. Wireless (such as Wi-Fi) ISDS 1100 Final Exam Review An act of malicious destruction to a computer or computer resource. Computer sabotage ISDS 1100 Final Exam Review Common types of computer sabotage? 1. 2. 3. Viruses Denial of Service attacks Data or program alteration ISDS 1100 Final Exam Review A small software program installed without the permission or knowledge of the user that is designed to alter the way a computer operates. Computer Virus ISDS 1100 Final Exam Review Two ways a virus can be sent: 1. 2. Downloaded from internet Sent via email ISDS 1100 Final Exam Review These systems verify the person requesting access is listed as an authorized user, but can’t tell if the person is really the individual he or she claims to be. Identification Systems ISDS 1100 Final Exam Review These systems verify the person requesting access is who she or he claim to be. Authentication Systems ISDS 1100 Final Exam Review Three types of access systems? 1. 2. 3. Possessed Knowledge Possessed Objects Biometrics ISDS 1100 Final Exam Review This system requires the individual requesting access to provide information that only the authorized user is supposed to know. Possessed Knowledge Access system ISDS 1100 Final Exam Review Examples of Possessed Knowledge Access systems: Passwords, Usernames, & PINs ISDS 1100 Final Exam Review This system uses physical objects for identification purposes. Possessed Object Identification system ISDS 1100 Final Exam Review Examples of Possessed Object Identification systems: 1. 2. 3. Smart cards Encoded badges Magnetic cards ISDS 1100 Final Exam Review This system uses biometric readers to identify users by a particular unique biological characteristic. Biometric Access systems ISDS 1100 Final Exam Review Examples of Biometric Access systems 1. 2. 3. 4. Fingerprint scanners Face Readers Hand Geometry Readers Iris Scanners ISDS 1100 Final Exam Review A security system that acts as a protective boundary between a computer network and the outside world. Firewall ISDS 1100 Final Exam Review Software that should be installed to protect a computer against becoming infected with a virus or another type of malware. Antivirus Software ISDS 1100 Final Exam Review A technique used to secure e-mail messages or other documents sent over the Internet. Encryption ISDS 1100 Final Exam Review Two most common types of encryption: 1. 2. Private key encryption Public key encryption ISDS 1100 Final Exam Review Protects against unauthorized access and encrypts data going to and coming from a server. Secure web server ISDS 1100 Final Exam Review Provides a continuous secure private tunnel from the user’s computer through the Internet to the business’s network. Virtual Private Network (VPN) ISDS 1100 Final Exam Review A booming area of computer crime that involves online theft, fraud, scams, and related activities. Dot cons ISDS 1100 Final Exam Review When someone obtains enough personal information about a person to be able to masquerade as the person. Identity theft ISDS 1100 Final Exam Review Occurs when a buyer pays for merchandise that is never delivered, or is delivered but is not as represented. Online auction fraud ISDS 1100 Final Exam Review A wide range of scams offered through Web sites or unsolicited emails, such as loan scams, pyramid schemes, work-at-home cons, & bogus credit card offers Internet offer scams ISDS 1100 Final Exam Review Making it appear that an e-mail or a Web site originates from somewhere other than its actual source. Spoofing or phishing ISDS 1100 Final Exam Review Occurs when hardware is stolen. Hardware theft ISDS 1100 Final Exam Review Can occur accidentally when hardware is dropped, gets wet, or is exposed to static or a power surge. Also can occur intentionally, such as by a burglar, vandal, or disgruntled employee. Hardware damage ISDS 1100 Final Exam Review The complete malfunction of a computer system. System failure ISDS 1100 Final Exam Review Protects against damage due to power fluctuations. Surge suppressors ISDS 1100 Final Exam Review Provides continuous power to a PC so it doesn’t shut off when the power goes off. Uninterruptible Power Supplies (UPSs) ISDS 1100 Final Exam Review It is important to do this with files so that when a problem occurs, those files can be restored. Create Backups (duplicate copies) of files ISDS 1100 Final Exam Review Spells out what an organization will do to prepare for and recover from a disruptive event. Disaster Recovery Plan ISDS 1100 Final Exam Review The unauthorized copying of a computer program. Software Piracy ISDS 1100 Final Exam Review The process of creating copies of currency and other printed resources using computers and other types of digital equipment. Digital Counterfeiting ISDS 1100 Final Exam Review Repeated threats or harassing behavior via e-mail or another Internet communications method. Cyberstalking ISDS 1100 Final Exam Review The state of being concealed or free from unauthorized intrusion. Privacy ISDS 1100 Final Exam Review The rights of individuals and companies to control how information about them is collected and used. Information Privacy ISDS 1100 Final Exam Review Small text files that are stored on your hard drive by the Web server. Cookies ISDS 1100 Final Exam Review Usually very small (1 pixel by 1 pixel) image on a Web page that transmits data about a Web page visitor back to the Web page’s server. Web Bugs ISDS 1100 Final Exam Review Any software installed without the user’s knowledge that secretly gathers information about the user and transmits it to advertisers. Spyware ISDS 1100 Final Exam Review Unsolicited e-mail sent to a large group of individuals at one time and is the electronic equivalent of junk mail. Spam ISDS 1100 Final Exam Review Other marketing activities used by companies: 1. 2. Pop-up and pop-under ads Telemarketing ISDS 1100 Final Exam Review Sorts your incoming e-mail messages. E-mail filter ISDS 1100 Final Exam Review Blocking access to Web sites containing objectionable material. Internet filtering ISDS 1100 Final Exam Review Software that records keystrokes, programs used, or otherwise monitors the activity a computer is used for. Computer monitoring software ISDS 1100 Final Exam Review Monitoring system used by the FBI to retrieve Internet traffic from a suspect’s PC. Carnivore ISDS 1100 Final Exam Review The legal rights to which the creators of intellectual property–original creative works–are entitled. Intellectual property rights ISDS 1100 Final Exam Review Main types of intellectual property rights are: 1. 2. 3. Copyrights Trademarks Patents ISDS 1100 Final Exam Review This is a form of protection available to the creator of an original artistic or literary work, such as a book, movie, software program, musical composition, or painting. Copyright ISDS 1100 Final Exam Review A word, phrase, symbol, or design that identifies and distinguishes one good or service from another. Trademark ISDS 1100 Final Exam Review Registering a domain name confusingly similar to a trademark or for the purpose of selling the domain name at an inflated price. Cybersquatting ISDS 1100 Final Exam Review Standards of moral conduct. Ethics ISDS 1100 Final Exam Review This is acquired when software is purchased. This permits the buyer to use the program. Software License ISDS 1100 Final Exam Review Four main types of software: 1. 2. 3. 4. Commercial software Shareware Freeware Public Domain software ISDS 1100 Final Exam Review Software that is given away by the author, but still are copyright protected. Freeware ISDS 1100 Final Exam Review Software that is distributed on the honor system; can be shared with others. Shareware ISDS 1100 Final Exam Review Software that is not copyrighted. Public Domain software ISDS 1100 Final Exam Review Software developed and sold for a profit; typically can’t be shared with others. Commercial software ISDS 1100 Final Exam Review Presenting someone else’s work as your own, which is both a violation of copyright law and unethical. Plagiarism ISDS 1100 Final Exam Review States what is considered proper and ethical use of school or company resources. Code of conduct ISDS 1100 Final Exam Review Summarizes the moral guidelines adopted by a particular organization and typically address such issues as honesty, integrity, fairness, responsibility to others, proper use of intellectual property, confidentiality, and accountability. Codes of ethics ISDS 1100 Final Exam Review An inaccurate statement or story spread through the use of computers. Computer hoax ISDS 1100 Final Exam Review The use of computers to modify text, images, photographs, music, and other digital content. Digital manipulation ISDS 1100 Final Exam Review Software and hardware products that have been announced and advertised, but are not yet–and may never be– available. Vaporware ISDS 1100 Final Exam Review Two new trends in storage devices today: 1. 2. Making portable personal storage more secure and convenient. Packing an increasing amount of data onto optical discs. ISDS 1100 Final Exam Review Involves creating computer components, machines, and other structures that are less than 100 nanometers (nm) in size. Nanotechnology ISDS 1100 Final Exam Review These computers utilize atoms or nuclei working together as quantum bits or qubits. Quantum computers ISDS 1100 Final Exam Review Uses light, such as from laser beams or infrared beams, to perform computations. Optical computers ISDS 1100 Final Exam Review For short-range connections, this is an emerging option. UltraWideband (UWB) ISDS 1100 Final Exam Review The science and engineering of making intelligent machines. Artificial Intelligence (AI) ISDS 1100 Final Exam Review Programs that perform specific tasks to help make a user’s work environment more efficient or entertaining. Intelligent Agents ISDS 1100 Final Exam Review Types of intelligent agents include: 1. 2. 3. 4. 5. Application assistants Search agents Shopping bots Entertainment bots Chatterbots ISDS 1100 Final Exam Review Software programs that perform tasks that would otherwise be performed by a human expert. Expert Systems ISDS 1100 Final Exam Review Expert systems usually consist of two main components: 1. 2. Knowledge Base Inference Engine ISDS 1100 Final Exam Review This component of the expert system applies the rules to the data stored in the knowledge base to reach decisions. Inference engine ISDS 1100 Final Exam Review This component of the expert system contains facts and rules provided by a human expert. Knowledge base ISDS 1100 Final Exam Review Artificial Intelligence (AI) systems that attempt to imitate the way a human brain works. Neural networks ISDS 1100 Final Exam Review The field devoted to the study of robots. Robotics ISDS 1100 Final Exam Review Devices, controlled by a human operator or a computer, that can move and react to sensory input. Robots ISDS 1100 Final Exam Review The use of a computer to create environments that look the way they do in the real world. Virtual Reality (VR) ISDS 1100 Final Exam Review This refers to the replacement or enhancement of body parts by mechanical versions. Bionics ISDS 1100 Final Exam Review These devices can transfer vital signs, blood-sugar readings, or other medical data directly to your attending physician. Electronic monitoring devices ISDS 1100 Final Exam Review A chip that is implanted under a person’s skin to be used for identification purposes; an ID number can be used to retrieve data about the individual, such as at a hospital. VeriChip ISDS 1100 Final Exam Review When a robot controlled by a physician operates on a patient. Robot-assisted surgery ISDS 1100 Final Exam Review When not all surgeons are in the operating room. Telesurgery ISDS 1100 Final Exam Review The use of communications technology to provide medical information and services. Telemedicine ISDS 1100 Final Exam Review A wearable robotic system designed to give soldiers additional physical capabilities and protection. Exoskeleton suit ISDS 1100 Final Exam Review Robots used to assess the safety of trails, buildings, caves, and other structures before soldiers enter them. Battlefield robots ISDS 1100 Final Exam Review