exam iii Flashcards
attempts to slow down or stop a computer by flooding information
denial of service attack
bullying on the internet
cyber bullying
privacy sercutiy ethics
ism
allows your work to be protected
digital millennium copyright
allows your work to be protected
digital rights management
an attempted illegal entry to a computer system that uses a dictionary headword list to generate possible passwords
dictionary attack
vpn hack
encryption and decryption
blocks hacks
firewall buffer
wap2 msot popular
wireless encryption
to view your records held by government agencies
freedom of information act
what your do echos
Digital footprint
small data files stored on your hard disk from websites your have visited
cookie files
steal on of. yours own indignity
indemnity theft
generated by an advertising company that is affiliated with the website
third party cookies
misgryae though networks web browsers and attach to different programs
viruses
attempts to trick internet users into thinking a fake but official looking website or email is legitimate
phishing
computers infected by viruses worm or trojan horse
zombies
protected wifi encrypts
visual private networks
incognito blocks
privacy mode
displays online advertisements
ad ware
viruses worms trojans horse
computer bugs