Chapter 9 - Privacy, Security, and Ethics Flashcards
web bugs
invisible images on a web page that can be used to transmit info without your knowledge
illusion of annoymity
The idea that you are safe using the internet as long as you’re using your own computer and not disclosing any personal information.
trojan horse
disguise themselves as free games or anti virus software, but actually contain viruses.
dictionary attack
a software that tries thousands of common words trying to guess a given password.
most browsers offer this, which ensures that your browsing activity is not recorded on your hard disk
Private mode
The most common protocol for website encryption is
https (hypertext transfer protocol secure)
What do information systems consist of?
People, procedures, software, hardware, data and the internet
Viruses
programs that migrate through networks and OS’s and attach themselves to programs and databases
Cracker
creates and distributes malicious programs