The discovery, collection, and analysis of evidence found on computers and networks.
Digital forensics: the discovery, collection, and analysis of evidence found oncomputers and networksSoftware theft: illegal act that occurs when someone steals software media,intentionally erases programs, illegally registers or activates a program or illegally copiesa programBusiness Software Alliance (BSA):alliance formed by major worldwide softwarecompanies to promote understanding of software piracyKeygen: programthat creates software registration numbers and sometimes activationcodesSoftware piracy: the unauthorized and illegal duplication of copyrighted softwareNetwork license: a legal agreement that allows multiple users to access software onthe server simultaneouslySite license: a legal agreement that permits users to install software on multiplecomputers usually at a volume discountInformation theft: illegal act that occurs when someone steals personal or confidentialinfoEncryption: the process of converting data that is readable by humans into encodedcharacters to prevent unauthorized accessDecrypt: the process of decoding encrypted dataPlaintext: unencrypted, readable dataCiphertext: encrypted scrambled dataEncryption algorithm: a set of steps that can convert readable plaintext intounreadable ciphertextEncryption key: a set of characters that the originator of the data uses to encrypt theplaintext and the recipient of the data uses to decrypt the ciphertextPrivate key encryption: encryption method where both the originator and the recipientuse the same secret key to encrypt and decrypt the dataPublic encryption key: encryption method that uses two encryption keys a public keyand a private keyVirtual Private Network (VPN):network that provides a mobile user with a secureconnection to a company network server as if the user has a private lineDigital signature: an encrypted code that a person, website, or organization attachesto an electronic message to verify the identity of the message senderDigital certificate: a notice that guarantees a user or a website is legitimateSecure site:a website that uses encryption techniques to secure its dataCertificate Authority (CA):an organization that issues digital certificates Show
focusNode Nội dung chính Show
Didn't know it? Knew it? Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page. Normal Size Small Size show me how Chapter 11 - Computer Security and Safety, Ethics, and Privacy
Is the discovery collection and analysis of evidence found on computers and networks group of answer choices?The discovery, collection, and analysis of evidence found on computers and networks. Also called computer forensics, network forensics, or cyberforensics. Who can use computer forensic evidence?General criminal and civil cases. This is because criminals sometimes store information in computers. Commercial organizations and companies can also use computer forensics to help them in cases of intellectual property theft, forgeries, employment disputes, bankruptcy investigations and fraud compliance. What is forensic investigation in cyber security?Cyber forensics is a process of extracting data as proof for a crime (that involves electronic devices) while following proper investigation rules to nab the culprit by presenting the evidence to the court. Cyber forensics is also known as computer forensics. What issues does computer forensics deal with?Computer forensics is an exciting field concerning security analysis, engineering, and legal procedural knowledge used in collecting and preserving electronic evidence. Electronic evidence may include raw data, photographs, files, log data, network and software parameters, or computer state information. What is the discovery collection and analysis of evidence found on computers and networks?Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law.
Is a program that assesses and reports information about various computer resources and devices?A performance monitor is a program that assesses and reports information about various computer resources and devices.
Is a small text file that a Web server stores on your computer?A "cookie" is a small text file containing information, generated by a web site's server and placed on a user's-visitor's personal computer or smart device.
Is the term used to refer to a hacker who usually does not have advanced computer and technical skills?Both hackers and crackers have advanced computer and network skills. A script kiddie has the same intent as a cracker but does not have the technical skills and knowledge. Script kiddies often are teenagers that use prewritten hacking and cracking programs to break into computers.
|