chapter 9 Flashcards
Refers to the responsibility of those who have data to control who is able to use that data.
Access
Relates to the responsibility of those who collect data to ensure that the data is correct.
Accuracy
a type of program designed to prevent and detect unwanted spyware program installations and to remove those programs if installed.
Antispyware
The process of ensuring the identity of a user.
Authentication
Term given to describe the ever-growing volume of data currently being collected.
Big data
Devices that check fingerprints or retinal scans.
Biometric scanning
A collection of zombie computers.
Botnet
A collection of temporary Internet files that contain web page content and instructions for displaying this content.
Browser cache
is an act performed by a knowledgeable computer user, sometimes called a “hacker,” that illegally browses or steals a company’s or individual’s private information.
Computer crime
Guidelines for the morally acceptable use of computers in our society.
Computer ethics
Law allowing prosecution of unauthorized access to computers and databases.
Computer Fraud and Abuse Act
The most invasive and dangerous type of spyware. These programs record every activity made on your computer, including credit card numbers, bank account numbers, and e-mail messages.
Computer monitoring software
Small data files that are deposited on your hard disk from websites you have visited.
Cookies
A legal concept that gives content creators the right to control use and distribution of their work.
Copyright
One who gains unauthorized access to a computer system for malicious purposes.
Cracker
The use of the Internet, a cell phone, or other device to deliver content intended to hurt or embarrass another person.
Cyberbullying
Any criminal offense that involves a computer and a network. Criminals may be employees, outside users, hackers and crackers, or organized crime members.
Cybercrime
A politically motivated cybercrime.
Cyberterrorism
A part of the deep web consisting of sites that use special software to hide a user’s IP address and makes it nearly impossible to identify who is using the site.
Dark web
The unauthorized access of a computer network and copying files to or from the server.
Data manipulation
Protection of software and data from unauthorized tampering or damage.
Data security
Comprised of websites designed to be hidden from standard search engines to allow communication in a secure and anonymous manner.
Deep web
A variant virus in which websites are overwhelmed with data and users are unable to access the website.
Denial of service (DoS) attack
Uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user’s account.
Dictionary attack
A collection of data that can be searched to reveal a highly detailed account of an individual’s life.
Digital footprint
Law that makes it legal for a program owner to make only his or her own backup copies of a software program. However, it is illegal for those copies to be resold or given away.
Digital Millennium Copyright Act
Encompasses various technologies that control access to electronic media and files.
Digital rights management (DRM)
Plan used by large organizations describing ways to continue operations following a disaster until normal computer operations can be restored.
Disaster recovery plan
A denial of service (DoS) attack that coordinates several computers making repeated requests for service to overwhelm and shut down an ISP or website.
Distributed denial of service (DDoS) attack
Programs that record virtually every activity on a computer system.
Employee-monitoring software
Coding information so that only the user can read or otherwise use it.
Encryption
A number used to gain access to encrypted information.
Encryption key
Standards of moral conduct.
Ethics
Software that uses specialized cameras to identify users and automatically log them in.
Facial recognition
A federal law that restricts disclosure of educational records.
Family Educational Rights and Privacy Act (FERPA)
Security hardware and software. All communications into and out of an organization pass through a special security computer, called a proxy server, to protect all systems against external threats.
Firewall
A cookie that is generated and then read only by the website you are currently visiting.
First-party cookie
Law giving citizens the right to examine data about them in federal government files, except for information restricted for national security reasons.
Freedom of Information Act of 1970
A law that protects personal financial information.
Gramm-Leach-Bliley Act
A federal law that protects medical records.
Health Insurance Portability and Accountability Act (HIPAA)
Created by the browser to store information on websites visited by your computer system.
History file
A widely used protocol for web traffic and to protect the transfer of sensitive information.
Hypertext transfer protocol secure (https)
The illegal assumption of someone’s identity for the purpose of economic gain.
Identity theft
The misconception that being selective about disclosing personal information on the Internet can prevent an invasion of personal privacy.
Illusion of anonymity
A privacy mode available from the Google Chrome browser.
Incognito Mode
Flash drive that, when connected to a computer, infects that computer with viruses.
Infected USB flash drive
purchase data from telecom and tech companies as well as collect data from credit bureaus, government and other public records.
Information broker
It gathers personal data on people and sells it to direct marketers, fund-raisers, and others, usually for a fee.
Information reseller
Using the Internet, a fraudulent act or operation designed to trick individuals into spending their time and money for little or no return.
Internet scam
Person responsible for maintaining the security of a company’s network, systems, and data. Employers look for candidates with a bachelor’s or associate’s degree in information systems or computer science and network experience.
IT security analyst
Another term for encryption key.
Key
Also known as computer monitoring software and sniffer programs. They can be loaded onto your computer without your knowledge.
Keylogger
is any program or file that is intentionally harmful to a computer, network or server.
Malware
Occurs when the electronic profile of one person is switched with another.
Mistaken identity
The information that people voluntarily post about themselves online.
Online identity
Special sequence of numbers, letters, and characters that limits access to information, such as electronic mail.
Password
Programs that help users create, use, and recall strong passwords.
Password manager
An attempt to trick Internet users into thinking a fake but official-looking website or e-mail is legitimate.
Phishing
Activity concerned with protecting hardware from possible human and natural disasters.
Physical security
A security application in Windows 10 that accepts a series of gestures over a picture of the user’s choice to gain access to a user’s account.
Picture Password
Representation of some other person’s work and ideas as your own without giving credit to the original source.
Plagiarism
Someone who engages in plagiarism.
Plagiarist
Computer ethics issue concerning the collection and use of data about individuals.
Privacy
A browser feature that eliminates history files and blocks most cookies.
Privacy mode
A privacy mode provided by Safari
Private Browsing
Computer ethics issue relating to who owns data and rights to software.
Property
Malicious software that encrypts your computer’s data and ransoms the password to the user.
Ransomware
(short for “robot network”) is a network of computers infected by malware that are under the control of a single attacking party, known as the “bot-herder.”
Robot network
Imitation hotspot intended to capture personal information.
Rogue Wi-Fi hotspot
The protection of information, hardware, and software.
Security
A collection of utility programs designed to protect your privacy and security while you are on the web.
Security suites
The practice of manipulating people to divulge private data.
Social engineering
Unauthorized copying of programs for personal gain.
Software piracy
Program such as Spybot and Spysweeper, designed to detect web bugs and monitor software.
Spy removal program
Wide range of programs designed to secretly record and report an individual’s activities on the Internet.
Spyware
File that has web page content and instructions for displaying this content.
Temporary Internet file
A cookie generated by an advertising company that is affiliated with the website you are currently visiting. Often also referred to as a tracking cookie.
Third-party cookie
a specialized type of cookie that can be shared by more than one website or service.
Tracking cookie
Program that is not a virus but is a carrier of virus(es). appear as free computer games, screen savers, or antivirus programs. Once downloaded, they locate and disable existing virus protection and then deposit the virus.
Trojan horse
A type of authentication that requires two types (or factors) of data to verify a user’s identity.
Two-factor authentication
A type of authentication that uses one type of authentication twice.
Two-step authentication
Creates a secure private connection between a remote user and an organization’s internal network.
Virtual private network (VPN)
Hidden instructions that migrate through networks and operating systems and become embedded in different programs. They may be designed to destroy data or simply to display messages.
Virus
Program hidden in the HTML code for a web page or e-mail message as a graphical image. They collect information on the users and report back to a predefined server.
Web bug
Restricts access to authorized users on wireless networks.
Wireless network encryption
Virus that doesn’t attach itself to programs and databases but fills a computer system with self-replicating information, clogging the system so that its operations are slowed or stopped.
Worm
A secure encryption protocol.
WPA2 (Wi-Fi Protected Access 2)
A computer infected by a virus, worm, or Trojan horse that allows it to be remotely controlled for malicious purposes.
Zombie