chapter 9 Flashcards
Refers to the responsibility of those who have data to control who is able to use that data.
Access
Relates to the responsibility of those who collect data to ensure that the data is correct.
Accuracy
a type of program designed to prevent and detect unwanted spyware program installations and to remove those programs if installed.
Antispyware
The process of ensuring the identity of a user.
Authentication
Term given to describe the ever-growing volume of data currently being collected.
Big data
Devices that check fingerprints or retinal scans.
Biometric scanning
A collection of zombie computers.
Botnet
A collection of temporary Internet files that contain web page content and instructions for displaying this content.
Browser cache
is an act performed by a knowledgeable computer user, sometimes called a “hacker,” that illegally browses or steals a company’s or individual’s private information.
Computer crime
Guidelines for the morally acceptable use of computers in our society.
Computer ethics
Law allowing prosecution of unauthorized access to computers and databases.
Computer Fraud and Abuse Act
The most invasive and dangerous type of spyware. These programs record every activity made on your computer, including credit card numbers, bank account numbers, and e-mail messages.
Computer monitoring software
Small data files that are deposited on your hard disk from websites you have visited.
Cookies
A legal concept that gives content creators the right to control use and distribution of their work.
Copyright
One who gains unauthorized access to a computer system for malicious purposes.
Cracker
The use of the Internet, a cell phone, or other device to deliver content intended to hurt or embarrass another person.
Cyberbullying
Any criminal offense that involves a computer and a network. Criminals may be employees, outside users, hackers and crackers, or organized crime members.
Cybercrime
A politically motivated cybercrime.
Cyberterrorism
A part of the deep web consisting of sites that use special software to hide a user’s IP address and makes it nearly impossible to identify who is using the site.
Dark web
The unauthorized access of a computer network and copying files to or from the server.
Data manipulation
Protection of software and data from unauthorized tampering or damage.
Data security
Comprised of websites designed to be hidden from standard search engines to allow communication in a secure and anonymous manner.
Deep web
A variant virus in which websites are overwhelmed with data and users are unable to access the website.
Denial of service (DoS) attack
Uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user’s account.
Dictionary attack
A collection of data that can be searched to reveal a highly detailed account of an individual’s life.
Digital footprint
Law that makes it legal for a program owner to make only his or her own backup copies of a software program. However, it is illegal for those copies to be resold or given away.
Digital Millennium Copyright Act
Encompasses various technologies that control access to electronic media and files.
Digital rights management (DRM)
Plan used by large organizations describing ways to continue operations following a disaster until normal computer operations can be restored.
Disaster recovery plan
A denial of service (DoS) attack that coordinates several computers making repeated requests for service to overwhelm and shut down an ISP or website.
Distributed denial of service (DDoS) attack
Programs that record virtually every activity on a computer system.
Employee-monitoring software
Coding information so that only the user can read or otherwise use it.
Encryption
A number used to gain access to encrypted information.
Encryption key
Standards of moral conduct.
Ethics
Software that uses specialized cameras to identify users and automatically log them in.
Facial recognition
A federal law that restricts disclosure of educational records.
Family Educational Rights and Privacy Act (FERPA)