____________ is the discovery, collection, and analysis of evidence found on computers and networks.

A __________ is a number(s) or character(s) that is appended to or insterted in primary key value.

A _________ is a combination of one or more related characters or bytes and is the smallest unit of data a user accesses. 

A _______ is a collection of data organized in a manner that allows access, retrieval, and use of that data.

________ is processed by ___________.

___________ procedures include adding records to modifying records in and deleting records from a file. 

A DBMS is ___________ that allows you to create, access, and manage _____________.

A ____________ contains data about files and fields in the database.

__________________ for data involve establishing who can enter new data, modify existing data, delete unwanted data, and view data. 

reduced, improved, reduced

Strengths of the database approach include __________ data redundancy, ____________ data integrity shared data, easier access, and ______________ development time. 

To reduce data entry errors, well-designed forms should __________ data as it is entered. 

Data warehouses often use a process called ___________ to find patterns and relationships among data.

___________ databases store data in tables.

Relational database users refer to a file as a table, a record as a _______, and a field as a _______.`

SQL is a _________ language that allows users to manage update and retrieve data.

administrator, data analyst

The database _____________ requires a more technical inside view of the data than does the ____________.

A ______________ attack is an assault whose purpose is to disrupt computer access to an Internet service such as the Web or email.

A biometric device translates a personal characteristic into ___________ code that is compared with a digital code stored in the computer. 

Computer viruses, worms, trojan horses, and rootkits are malware that acts with_____ a user's knowledge.

script kiddie, cyberextortionist

Perpetrators of cybercrime and other intrusions fall into seven basic categories: hacker, cracker ___________, corporate spy, unethical employee, ___________ and cyber terrorist. 

____________ passwords provide greater security than _______ ones. 

Updating an antivirus program's _____________ protects a computer against viruses written since the antivirus program was released. 

An end user license agreement (EULA) ________________ users to give copies to friends and colleagues, while continuing to use the software.

Encryption is a process of converting _________ into___________ to prevent unauthorized access. 

Two ______________ security standards are Wi-Fi protected access and 802.00i. 

To prevent against data loss caused by a system failure, computer users should ________ files regularly.

A _________________ gives authors and artists exclusive rights to duplicate, publish and sell their materials. 

tendonitis or CTS (carpal tunnel syndrome)

Factors that cause ________________________ include prolonged typing, prolonged mouse usage or continual shifting between the mouse and the keyboard. 

________________ is the discovery, collection, and analysis of evidence found on computers and networks.

Users should ____ store obsolete computers and devices in their basement or attic.

You can_____ assume that information on the Web is correct. 

Digital forensics: the discovery, collection, and analysis of evidence found oncomputers and networksSoftware theft: illegal act that occurs when someone steals software media,intentionally erases programs, illegally registers or activates a program or illegally copiesa programBusiness Software Alliance (BSA):alliance formed by major worldwide softwarecompanies to promote understanding of software piracyKeygen: programthat creates software registration numbers and sometimes activationcodesSoftware piracy: the unauthorized and illegal duplication of copyrighted softwareNetwork license: a legal agreement that allows multiple users to access software onthe server simultaneouslySite license: a legal agreement that permits users to install software on multiplecomputers usually at a volume discountInformation theft: illegal act that occurs when someone steals personal or confidentialinfoEncryption: the process of converting data that is readable by humans into encodedcharacters to prevent unauthorized accessDecrypt: the process of decoding encrypted dataPlaintext: unencrypted, readable dataCiphertext: encrypted scrambled dataEncryption algorithm: a set of steps that can convert readable plaintext intounreadable ciphertextEncryption key: a set of characters that the originator of the data uses to encrypt theplaintext and the recipient of the data uses to decrypt the ciphertextPrivate key encryption: encryption method where both the originator and the recipientuse the same secret key to encrypt and decrypt the dataPublic encryption key: encryption method that uses two encryption keys a public keyand a private keyVirtual Private Network (VPN):network that provides a mobile user with a secureconnection to a company network server as if the user has a private lineDigital signature: an encrypted code that a person, website, or organization attachesto an electronic message to verify the identity of the message senderDigital certificate: a notice that guarantees a user or a website is legitimateSecure site:a website that uses encryption techniques to secure its dataCertificate Authority (CA):an organization that issues digital certificates

a group of compromised computers or mobile devices connected to a network

A botnet composed computer or device is known as a ________

_______ ___ _______ _______ (____ _______) disrupts computer access to Internet services

denial of service attack (DoS attack)

a program or set of instructions in a program that allow users to bypass security controls

a technique intrudes use to make their network or Internet transmission appear legitimate

hardware and/or software that protects a network resources form intrusion

What is the difference between unauthorized access and unauthorized use?

unauthorized access- the use of a computer or network without permission

unauthorized use- the use of a computer or its data for unapproved or possibly illegal activities

To protect files on your local hard disk from hackers and other intrudersm turn off ___ and _______ _______ on your Internet connection

a security measure that defines who can access a computer, device, or network

(1) who can access a computer (2) when they can access it

(3) what actions can be taken while accessing it

a unique combination of characters that identifies one specific user

a private combination of characters associated with the user name that allows access to certain computer resources

A ___________ ________ is any item that you can, to gain access to a computer or computer facility

A posessed object can often be used in combination with a ____ (_________ ____________ _________)

PIN (personal identification number)

authenticates a person's identity by translating a personal characteristics into a digital code that is compared with a digital code in a computer

the discovery, collection, and analysis of evidence found on computers and networks

Software theft occurs when resources:

(1) steals software media (2) inetionally erases programs (3) illegally registers and/or activites a program

(4) illegally copies a program

A single-user license agreement typically contains the followign conditions:
You can:

(1) install the software on only one computer (2) make one copy of the software as a backup

(3) give or sell the software to another individual, but only if the software is removed from the user's computer first

A single-user license agreement typically contains the followign conditions:
You cannot:

(1) install the software on a network's software(2) export the software (3) rent or lease the software

(4) give copies to friends and colleagues, while continuing software

What are the common types of malware?

(1) virus (2) worm (3) trojan horse(4) rootkit (5) spyware

(6) adware

Which type of malware is this:
a potentially damaging program that affects, or infects, a computer or mobile device negatively by altering the way the computer or device works without the user's knowledge or permission

Which type of malware is this:
a program that copies itself repeatedly, using up resources and possibly shurring down the computer, device, or network

Which type of malware is this:
a program that hides within or looks like a legitimate program.

Which type of malware is this:
a program that hides in a computer or mobile device and allows someone from a remote location to take full control of the computer or device

Which type of malware is this:
a program placed on a computer or mobile device without the user's knowledge that secretly collects information about the user and then communicates the information it collects to some outside source whiel the user is online

Which type of malware is this:
a program that displays an online advertisement in a banner or pop-up window on webpages, email messages, or other Internet services

True or False: A trojan horse can replicate itself

False; unlike a virus or worm, a trojan horse does not replicate itself to other computers or devices

occurs when someone steals personal or confidential information

a process of converting data that is readable by humans into encoded characters to prevent unauthorized access

a notice that guarantees a user or a website is legitimate

a website that uses encryption techniques to secure its data is known as a _______ _____

What is the difference of hardware theft and hardware vandalism?

Hardware theft- the act of stealing digital equipment

Hardware vandalism- the act of defacing or destroying digital equipment

To help reduce the chance of theft, companies and schools use a variety of ________ __________

List hardware theft and vandalism safeguards.

(1) physical access controls (2) alarm system (3) physical security devices

(4) device-tracking app

List hardware failured safeguards.

(1) surge protector (2) uninterruptible power supply (UPS) (3) duplicate components or duplicate computers

(4) fault-tolerant computer

What is the worldwide collection of computer networks called?

The Internet is the worldwide, publicly accessible network of interconnected computer networks that transmit data by packet switching using the standard Internet Protocol (IP).

Is a program that performs a repetitive task on a network?

A 'bot' – short for robot – is a software program that performs automated, repetitive, pre-defined tasks.

What term is used to describe the discovery collection and analysis of evidence?

What term is used to describe the discovery, collection, and analysis of evidence found on computers and networks? digital forensics.

What is the discovery collection and analysis of evidence found on computers and networks?

Glossary
digital forensics
The discovery, collection, and analysis of evidence found on computers and networks. See also computer forensics, cyberforensics, or network forensics.
digital rights management (DRM)
Strategy designed to prevent illegal distribution of movies, music, and other digital content.
Student Resource Glossary - Cengagewww.cengage.com › cgi-wadsworth › course_products_wpnull