DSST Intro to Computers

Copyrighted products such as music movies and

Info iconThis preview shows pages 10–11. Sign up to view the full content.

View Full Document Right Arrow Icon
copyrighted products such as music, movies, and computer games, used to prevent piracy 192. RSI (Repetitive Stress Injury) – affects tendons, muscles and nerves in the hands, wrists, arms and shoulders, by improper positioning of keyboard and mouse 193. Theft of Time and Services – when employees use the company computer for non-work actives 194. SOX (Sarbanes-Oxley Act) – full disclosure of accounting systems and protects whistleblowers to prevent fraud 195. Biometric Authentication Devices – the use of a person’s physical characteristics (fingerprinting and retina scan) 196. E-waste – discarded monitors, televisions, printers, cell phones, and other electronic devices 197. Employees – 75-80% of computer crimes are committed by current and former employees 198. Browser Hijacker – spyware that changes browser settings without your knowledge 199. Adware – spyware that tracks surfing and online purchases (popups and other ads) 200. Cookies – small text files left on your hard drive of the websites visited 201. VoIP (Voice over Internet Protocol) – internet protocol used to make phone calls over the internet 202. MIDI – (Musical Instrument Digital Interface) – protocol used to communicate between electronic musical instruments and devices that control and manage them. Describes, musical notes, pitch and length used to reproduce music 203. Keystroke Logger – spyware that records each character typed, used to steal passwords 204. ISPs – are connected to the internet backbone via a NAP (Network Access Point) 205. Spoofing – forging and email senders name, sending a message that appears to come from someone other than the sender. Used by spammers
Background image of page 10

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
206. Phishing – sending a legitimate looking email attempting to obtain financial information or passwords 207. DOS (Denial of Service) – overloading a server or network by bombarding it with thousands or millions of request making it unable to respond 208. WORM – a program that copies itself and uses your contact information to infect all of your contacts computers by sending an infected email; different from a Virus in which attaches to a file that is executed by the user. a. Famous WORMS – Code RED, NIMDA, MYDOOM 209. Logic Bombs – Viruses that are set to go off at certain time 210. White Hat Hackers – professional hackers that break into computers with permission to identify security flaws 211. Cyber terrorists – politically motivated hackers who attach computers systems intending to cause large scale physical or financial harm, typically attack Military, Banks, Power Plants, Water Treatment and Traffic Control centers. 212. The Advanced Research Projects Agency Network (ARPANET) was the world's first operational packet switching network and the progenitor of what was to become the global Internet . The network was initially funded by the Advanced Research Projects Agency (ARPA, later DARPA) within the U.S. Department of Defense for use by its projects at universities and research laboratories in the US
Background image of page 11
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

Page10 / 11

copyrighted products such as music movies and computer...

This preview shows document pages 10 - 11. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online