Chap 5 Flashcards
Netiquette
includes the code of acceptable behaviors
users should follow while on the Internet; that is, it is the conduct expected of individuals while online.
set of legal and moral guidelines that
govern the use of technology, including computers,
mobile devices, information systems, and databases
Digital ethics
Cyberbullying
a form of bullying that involves digital
devices and platforms such as social media sites, online forums, messaging apps, and email.
one state that has attempted to define and
enact punishment for cyberbullying. Missouri statute
defines cyberbullying as bullying “through the
transmission of a communication, including but not limited to, a message, text, sound, or image by means of an electronic device.”
Missouri
Distracted driving
driving a vehicle while
focusing on other activities, typically involving an
electronic device such as a cell phone.
a document that lists guidelines and repercussions
of using the Internet and other digital company resources, including network storage and email servers
distributed in part to reduce an organization’s
liability and to clarify what is and is not a fireable offense
AUP or Acceptable Use Policies (AUPs)
How to discourage plagarism
To help discourage plagiarism of other people’s work,
teachers often require students to submit papers using a service, such as Turnitin, that automatically checks for plagiarized passages; Turnitin can also help students check for uncited passages and more before submitting
Your green computing efforts should include:
- Purchasing and using products with an ENERGY STAR label
- Shutting down your computers and devices overnight or when not in use.
- Donating computer equipment
- Using paperless communication
- Recycling paper, toner and ink cartridges, computers, mobile devices, and printers
- Telecommuting and using videoconferencing for meetings
risk
any possibility that something might occur resulting
in an injury or a loss
digital security risk
any event or action that could cause
a loss of or damage to a computer or mobile device
hardware, software, data, information, or processing
capability
Types of digital security risks
threats to our information, physical health, mental health, and the environment.
Any illegal act involving the use of a computer or related devices
computer crime
an online or Internet-based illegal act
cybercrime
Software used by cybercriminals
crimeware
the practice of protection against digital
threats, including unauthorized or illegal access to data.
Cybersecurity
discovery, collection, and analysis of evidence found on computers and networks.
Digital forensics, or cyber forensics
knowledge of the law, technical experience with many types of hardware and software products, superior communication skills, familiarity with corporate structures and policies, a willingness to learn and update skills, and a knack for problem-solving
A digital forensics examiner
attackers who are strongly motivated by
principles or beliefs
Hacktivists
a part of the web that is accessed using
specialized software, where users and website operators can remain anonymous while performing illegal actions
dark web
more general and common term used to
describe individuals who launch attacks against other
users and their computers
Threat actor
a period of time during which an
individual refrains from using technology
digital detox
malicious software, consists of
programs that act without a user’s knowledge and
deliberately alter the operations of computers and mobile devices
Malware
A program that displays an online advertisement in a banner, pop-up window, or pop under window on webpages, email messages, or other Internet services
Adware
A program that hides in a computer or mobile device and allows someone from a remote
location to take full control of the computer or device
Rootkit
A program placed on a computer or mobile device without the user’s knowledge that
secretly collects information about the user and then communicates the information it
collects to some outside source while the user is online
Spyware
A program that hides within or looks like a legitimate program. Unlike a virus or worm, a
trojan horse does not replicate itself to other computers or devices
Trojan horse
A potentially damaging program that affects, or infects, a computer or mobile device
negatively by altering the way the computer or device works without the user’s knowledge or permission
Virus
A program that copies itself repeatedly, for example in memory or on a network, using up
resources and possibly shutting down the computer, device, or network
Worm
a program that performs a repetitive task on a network
bot
a group of compromised computers or mobile devices
connected to a network
botnet