Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Chapter 9 | IS 101 - Introduction to Information Systems, Quizzes of Information Technology

Class: IS 101 - Introduction to Information Systems; Subject: Information Systems; University: University of Nevada-Reno; Term: Fall 2011;

Typology: Quizzes

2011/2012

Uploaded on 08/14/2012

kellenjerome
kellenjerome 🇺🇸

8 documents

1 / 3

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
TERM 1
Biometrics
DEFINITION 1
Science of measuring individual body characteristics.
TERM 2
Botnet
DEFINITION 2
Short for robot network. A network of computers
compromised by means of a Trojan horse that plants
instructions within each PC to wait for commands form the
person controlling that network.
TERM 3
Computer crime
DEFINITION 3
Crime of two types: (1) an illegal act perpetrated against
computers or telecommunications; (2) the use of computers
or telecommunications to accomplish an illegal act.
TERM 4
Cyberwarfare
DEFINITION 4
The use of computers and the internet to attack an enemys
information systems.
TERM 5
Disaster-recovery plan
DEFINITION 5
Method of restoring information-processing operations that
have been halted by destruction or accident.
pf3

Partial preview of the text

Download Chapter 9 | IS 101 - Introduction to Information Systems and more Quizzes Information Technology in PDF only on Docsity!

TERM 1

Biometrics

DEFINITION 1 Science of measuring individual body characteristics. TERM 2

Botnet

DEFINITION 2 Short for robot network. A network of computers compromised by means of a Trojan horse that plants instructions within each PC to wait for commands form the person controlling that network. TERM 3

Computer crime

DEFINITION 3 Crime of two types: (1) an illegal act perpetrated against computers or telecommunications; (2) the use of computers or telecommunications to accomplish an illegal act. TERM 4

Cyberwarfare

DEFINITION 4 The use of computers and the internet to attack an enemys information systems. TERM 5

Disaster-recovery plan

DEFINITION 5 Method of restoring information-processing operations that have been halted by destruction or accident.

TERM 6

Encryption

DEFINITION 6 Process of altering readable data so that it is not usable unless the changes are undone. TERM 7

Evil Twin

attack

DEFINITION 7 A variant on conventional phishing, in which a hacker or cracker sets up a Wi-Fi hot spot or access point that makes your computer think its accessing a safe public network or your home network and then monitors your communications. TERM 8

Security

DEFINITION 8 System of safeguards for protecting information technology against disasters, system failures, and unauthorized access that can result in damage or loss. Five components of security are deterrents to computer crime, identification and access, encryption, protection of software and data, and disaster-recovery plans. TERM 9

Sexting

DEFINITION 9 The act of sending sexually revealing pictures of oneself through cellphone text messages or email. TERM 10

Zombie

DEFINITION 10 Also known as a drone. A computer taken over covertly and programmed to respond to instructions sent remotely, often by instant-messaging channels.