Discovering Computers, Chapter 5

SmartScreen Filter
A way to adjust security settings offered by Internet Explorer
A type of fraudulent e-mail that typically contains misspellings and dire warnings
The process used to verify or identify computer users
Using physical features such as fingerprints, facial recognition, and retinal scans to verify a person’s identity
Using text messages to get you to download a mobile app that steals your information
Type of malware that spreads without human interaction, sending itself out to everyone in your address book
Type of malware that is spread when you distribute infected files, especially as e-mail attachments
Type of malware that collects bits of data, like your surfing habits
A slowed down Wi-Fi connection can be the result of this
White Hat
Type of hacker that wants to show off their skills and doesn’t intend any serious damage
hurricanes and storms
Events that account for almost half of total catastrophic data losses
Type of power supply/battery backup device that can prevent some form of data loss
Black Hat
Type of hacker who intends serious harm through espionage, theft, or disruption of a network
Using automated attack tools like viruses and worms to deliberately disrupt computers and networks to affect the most people
Components of an online profile
Details about an individual that are combined from online and offline behaviors, including comments, postings, likes and shares, and online coupons
A set of online communication practices and rules
Identity theft
The nation’s fastest growing crime, where victims are unaware it’s being committed until the damage is done
Driver’s license, birth certificate
Items an identity thief can obtain to impersonate you
Common forms include computer viruses, Trojan horses, and worms
Displays unwanted advertisements in banners or pop-up windows on your computer
Computer taken over by hackers to perform malicious tasks across a network