Computers 1
Computers 2
Computers 3
Computers 4
Computers 5
100
Software that attempts to block unwanted e-mail Some might require first-time e-mailers to be verified before their e-mails are accepted
What is Spam filter
100
Intimidates or coerces a government or organization to advance his or her political or social objectives
What is Cyber terrorist
100
Malicious program that disguises itself as a useful application or game and purposefully does something the user does not expect
What is a Trojan Horse
100
Small program hidden in a network that records identification numbers and passwords
What is a Password sniffer
100
Science of designing machines, products, and systems to maximize safety, comfort, and efficiency of people who use them
What is Ergonomics
200
New tactic spammers use to circumvent spam-filtering software
What is Image-based Spam
200
Gains unauthorized use or illegal access to computer systems
What is Criminal hacker
200
Set of programs that enable its user to gain administrator level access to a computer or network
What is a Rootkit
200
Act of unauthorized copying or distribution of copyrighted software Penalties can be severe
What is Software piracy
300
Top four categories of computer crime reported to law enforcement organizations during 2009
What is: Undelivered merchandise or nonpayment Identity theft Credit card fraud Auction fraud
300
Unskilled individuals who use scripts or programs developed by others to attack computer systems and networks and deface websites
What is Script bunny
300
Type of Trojan horse that executes when specific conditions occur
What is a Logic Bomb
300
Responds to network security breaches Monitors systems for emerging threats
What is Computer Emergency Response Team (CERT) cert.org
400
Using social skills to get computer users to provide information to access an information system
What is Social engineering
400
Program file capable of attaching to disks or other files and replicating itself repeatedly
What is a Virus
400
Modified version of a virus that is produced by virus’s author or another person
What is a Variant
400
Can employers monitor employees’ e-mail
Yes
500
Going through trash cans to find secret or confidential information
What is Dumpster diving
500
Program file capable of attaching to disks or other files and replicating itself repeatedly
What is a Worm
500
Software installed on a personal computer to: Intercept or take partial control over user’s interaction with the computer without knowledge or permission of the user Similar to a Trojan horse in that: Users unknowingly install it when they download freeware or shareware from the Internet
What is Spyware
500
Microchips with antenna Used in supply chain for inventory control Embedded in many of the products we buy: Medicine containers, clothing, computer printers, car keys, library books, tires Generate radio transmissions that, if appropriate measures are not taken, can lead to potential privacy concerns
What is RFID