chapter 9 Flashcards

1
Q

Refers to the responsibility of those who have data to control who is able to use that data.

A

Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Relates to the responsibility of those who collect data to ensure that the data is correct.

A

Accuracy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

a type of program designed to prevent and detect unwanted spyware program installations and to remove those programs if installed.

A

Antispyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The process of ensuring the identity of a user.

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Term given to describe the ever-growing volume of data currently being collected.

A

Big data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Devices that check fingerprints or retinal scans.

A

Biometric scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A collection of zombie computers.

A

Botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A collection of temporary Internet files that contain web page content and instructions for displaying this content.

A

Browser cache

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

is an act performed by a knowledgeable computer user, sometimes called a “hacker,” that illegally browses or steals a company’s or individual’s private information.

A

Computer crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Guidelines for the morally acceptable use of computers in our society.

A

Computer ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Law allowing prosecution of unauthorized access to computers and databases.

A

Computer Fraud and Abuse Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The most invasive and dangerous type of spyware. These programs record every activity made on your computer, including credit card numbers, bank account numbers, and e-mail messages.

A

Computer monitoring software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Small data files that are deposited on your hard disk from websites you have visited.

A

Cookies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A legal concept that gives content creators the right to control use and distribution of their work.

A

Copyright

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

One who gains unauthorized access to a computer system for malicious purposes.

A

Cracker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The use of the Internet, a cell phone, or other device to deliver content intended to hurt or embarrass another person.

A

Cyberbullying

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Any criminal offense that involves a computer and a network. Criminals may be employees, outside users, hackers and crackers, or organized crime members.

A

Cybercrime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A politically motivated cybercrime.

A

Cyberterrorism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A part of the deep web consisting of sites that use special software to hide a user’s IP address and makes it nearly impossible to identify who is using the site.

A

Dark web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The unauthorized access of a computer network and copying files to or from the server.

A

Data manipulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Protection of software and data from unauthorized tampering or damage.

A

Data security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Comprised of websites designed to be hidden from standard search engines to allow communication in a secure and anonymous manner.

A

Deep web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A variant virus in which websites are overwhelmed with data and users are unable to access the website.

A

Denial of service (DoS) attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user’s account.

A

Dictionary attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

A collection of data that can be searched to reveal a highly detailed account of an individual’s life.

A

Digital footprint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Law that makes it legal for a program owner to make only his or her own backup copies of a software program. However, it is illegal for those copies to be resold or given away.

A

Digital Millennium Copyright Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Encompasses various technologies that control access to electronic media and files.

A

Digital rights management (DRM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Plan used by large organizations describing ways to continue operations following a disaster until normal computer operations can be restored.

A

Disaster recovery plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

A denial of service (DoS) attack that coordinates several computers making repeated requests for service to overwhelm and shut down an ISP or website.

A

Distributed denial of service (DDoS) attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Programs that record virtually every activity on a computer system.

A

Employee-monitoring software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Coding information so that only the user can read or otherwise use it.

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

A number used to gain access to encrypted information.

A

Encryption key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Standards of moral conduct.

A

Ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Software that uses specialized cameras to identify users and automatically log them in.

A

Facial recognition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

A federal law that restricts disclosure of educational records.

A

Family Educational Rights and Privacy Act (FERPA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Security hardware and software. All communications into and out of an organization pass through a special security computer, called a proxy server, to protect all systems against external threats.

A

Firewall

37
Q

A cookie that is generated and then read only by the website you are currently visiting.

A

First-party cookie

38
Q

Law giving citizens the right to examine data about them in federal government files, except for information restricted for national security reasons.

A

Freedom of Information Act of 1970

39
Q

A law that protects personal financial information.

A

Gramm-Leach-Bliley Act

40
Q

A federal law that protects medical records.

A

Health Insurance Portability and Accountability Act (HIPAA)

41
Q

Created by the browser to store information on websites visited by your computer system.

A

History file

42
Q

A widely used protocol for web traffic and to protect the transfer of sensitive information.

A

Hypertext transfer protocol secure (https)

43
Q

The illegal assumption of someone’s identity for the purpose of economic gain.

A

Identity theft

44
Q

The misconception that being selective about disclosing personal information on the Internet can prevent an invasion of personal privacy.

A

Illusion of anonymity

45
Q

A privacy mode available from the Google Chrome browser.

A

Incognito Mode

46
Q

Flash drive that, when connected to a computer, infects that computer with viruses.

A

Infected USB flash drive

47
Q

purchase data from telecom and tech companies as well as collect data from credit bureaus, government and other public records.

A

Information broker

48
Q

It gathers personal data on people and sells it to direct marketers, fund-raisers, and others, usually for a fee.

A

Information reseller

49
Q

Using the Internet, a fraudulent act or operation designed to trick individuals into spending their time and money for little or no return.

A

Internet scam

50
Q

Person responsible for maintaining the security of a company’s network, systems, and data. Employers look for candidates with a bachelor’s or associate’s degree in information systems or computer science and network experience.

A

IT security analyst

51
Q

Another term for encryption key.

A

Key

52
Q

Also known as computer monitoring software and sniffer programs. They can be loaded onto your computer without your knowledge.

A

Keylogger

53
Q

is any program or file that is intentionally harmful to a computer, network or server.

A

Malware

54
Q

Occurs when the electronic profile of one person is switched with another.

A

Mistaken identity

55
Q

The information that people voluntarily post about themselves online.

A

Online identity

56
Q

Special sequence of numbers, letters, and characters that limits access to information, such as electronic mail.

A

Password

57
Q

Programs that help users create, use, and recall strong passwords.

A

Password manager

58
Q

An attempt to trick Internet users into thinking a fake but official-looking website or e-mail is legitimate.

A

Phishing

59
Q

Activity concerned with protecting hardware from possible human and natural disasters.

A

Physical security

60
Q

A security application in Windows 10 that accepts a series of gestures over a picture of the user’s choice to gain access to a user’s account.

A

Picture Password

61
Q

Representation of some other person’s work and ideas as your own without giving credit to the original source.

A

Plagiarism

62
Q

Someone who engages in plagiarism.

A

Plagiarist

63
Q

Computer ethics issue concerning the collection and use of data about individuals.

A

Privacy

64
Q

A browser feature that eliminates history files and blocks most cookies.

A

Privacy mode

65
Q

A privacy mode provided by Safari

A

Private Browsing

66
Q

Computer ethics issue relating to who owns data and rights to software.

A

Property

67
Q

Malicious software that encrypts your computer’s data and ransoms the password to the user.

A

Ransomware

68
Q

(short for “robot network”) is a network of computers infected by malware that are under the control of a single attacking party, known as the “bot-herder.”

A

Robot network

69
Q

Imitation hotspot intended to capture personal information.

A

Rogue Wi-Fi hotspot

70
Q

The protection of information, hardware, and software.

A

Security

71
Q

A collection of utility programs designed to protect your privacy and security while you are on the web.

A

Security suites

72
Q

The practice of manipulating people to divulge private data.

A

Social engineering

73
Q

Unauthorized copying of programs for personal gain.

A

Software piracy

74
Q

Program such as Spybot and Spysweeper, designed to detect web bugs and monitor software.

A

Spy removal program

75
Q

Wide range of programs designed to secretly record and report an individual’s activities on the Internet.

A

Spyware

76
Q

File that has web page content and instructions for displaying this content.

A

Temporary Internet file

77
Q

A cookie generated by an advertising company that is affiliated with the website you are currently visiting. Often also referred to as a tracking cookie.

A

Third-party cookie

78
Q

a specialized type of cookie that can be shared by more than one website or service.

A

Tracking cookie

79
Q

Program that is not a virus but is a carrier of virus(es). appear as free computer games, screen savers, or antivirus programs. Once downloaded, they locate and disable existing virus protection and then deposit the virus.

A

Trojan horse

80
Q

A type of authentication that requires two types (or factors) of data to verify a user’s identity.

A

Two-factor authentication

81
Q

A type of authentication that uses one type of authentication twice.

A

Two-step authentication

82
Q

Creates a secure private connection between a remote user and an organization’s internal network.

A

Virtual private network (VPN)

83
Q

Hidden instructions that migrate through networks and operating systems and become embedded in different programs. They may be designed to destroy data or simply to display messages.

A

Virus

84
Q

Program hidden in the HTML code for a web page or e-mail message as a graphical image. They collect information on the users and report back to a predefined server.

A

Web bug

85
Q

Restricts access to authorized users on wireless networks.

A

Wireless network encryption

86
Q

Virus that doesn’t attach itself to programs and databases but fills a computer system with self-replicating information, clogging the system so that its operations are slowed or stopped.

A

Worm

87
Q

A secure encryption protocol.

A

WPA2 (Wi-Fi Protected Access 2)

88
Q

A computer infected by a virus, worm, or Trojan horse that allows it to be remotely controlled for malicious purposes.

A

Zombie