Chapter 15: Computer Security and Privacy Flashcards

(26 cards)

1
Q

Computer monitoring software

A

Software that can be used to record an individual’s computer usage, such as capturing images of the screen, recording the actual keystrokes used, or creating a summary of Web sites and programs accessed. (p617)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

digital counterfeiting

A

The use of computers or other types of digital equipment to make illegal copies of currency, checks, collectibles, and other items. (p603)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

disaster recovery plan

A

A written plan that describes the steps a company will take following the occurrence of a disaster. (p601)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

e-mail filter

A

A tool that automatically sorts your incoming e-mail messages based on specific criteria. (p613)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

electronic profiling

A

Using electronic means to collect a variety of in-depth information about an individual, such as name, address, income, and buying habits. (p609)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Employee monitoring

A

Observing or reviewing employees’ actions while they are on the job. (p621)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

full disk encryption (FDE)

A

A technology that encrypts everything stored on a storage medium automatically, without any user interaction. (p595)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

government databases

A

A collection of data about people that is collected and maintained by the government. (p608)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

hardware theft

A

The theft of computer hardware. (p592)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

information privacy

A

The rights of individuals and companies to control how information about them is collected and used. (p606)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Marketing databases

A

A collection of data about people that is stored in a large database and used for marketing purposes. (p607)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

opt in

A

To request that you be included in marketing activities or that your information be shared with other companies. (p615)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

opt out

A

To request that you be removed from marketing activities or that your information not be shared with other companies. (p614)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Presence technology

A

Technology that enables one computing device (such as a computer or mobile device) to locate and identify the current status of another device on the same network. (p622)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Privacy

A

The state of being concealed or free from unauthorized intrusion. (p606)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

privacy policy

A

A policy, commonly posted on a company’s Web site, that explains how personal information provided to that company will be used. (p609)

17
Q

ruggedized devices

A

A device (such as a portable computer or mobile phone) that is designed to withstand much more physical abuse than its conventional counterpart. (p598)

18
Q

self-encrypting hard drive

A

A hard drive that uses full disk encryption (FDE). (p595)

19
Q

Software piracy

A

The unauthorized copying of a computer program. (p602)

20
Q

Spam

A

Unsolicited, bulk e-mail sent over the Internet. (p610)

21
Q

spam filters

A

An e-mail filter used to redirect spam from a user’s Inbox. (p613)

22
Q

surge suppressor

A

A device that protects hardware from damage due to electrical fluctuations. (p598)

23
Q

system failure

A

The complete malfunction of a computer system. (p592)

24
Q

throw-away e-mail address

A

An e-mail address used only for nonessential purposes and activities that may result in spam; the address can be disposed of and replaced if spam becomes a problem. (p611)

25
uninterruptible power supply (UPS)
A device containing a built-in battery that provides continuous power to a computer and other connected components when the electricity goes out. (p598)
26
video surveillance
The use of video cameras to monitor activities of individuals, such as employees or individuals in public locations, for work-related or crime-prevention purposes. (p619)