Lesson 31: Computer Ethics and Safety Flashcards
Used to protect against unwanted access or use to or form a network
Firewall
For your personal computer. It should not contain personal information such as a name or birthdate
Password
Require more information than a password to authenticate your identity
Two-Step Verifications
Used to block content coming into and going out to the Internet
Filtering
Used to block content coming into and going out to the Internet
Filtering
Refers to any software that is designed to cause damage to a single computer, server, or computer network
Malware
A program that had been written to corrupt data on a computer; attached to a file and spreads from file to file when program is executed
Virus
Makes many copies of itself, so that computer slows down or halts tasks
Worm
Does not cause damage until a specified date or until the system has been launched a certain number of times
Time Bomb
Triggered by the appearance or disappearance of specified data
Logic Bomb
Does something different from what is expected to do; performs one task but is actually doing another task
Trojan Horse
Malicious program that records keystrokes; aids identity theft
Keylogger
Fraudulently installed on a personal computer to collect information about the user
Spyware
A fraudulent attempt to steal information to commit identity theft; comes from a legitimate source and asksa link in the email to update personal info
Phishing
A fraudulent attempt to steal information to commit identity theft; comes from a legitimate source and asks a link in the email to update personal info
Phishing
Before providing personal info in an e-commerce site, first verify if the site is secure
E-Commerce Safety
E-commerce websites usually use _________ _____________ to make them secure
Encrypted Communication
Before you make a financial transaction, you need to confirm that you have a secure and encrypted connection
E-Commerce Safety
TLS
Transport Layer Security
SSL
Secure Sockets Layer
Technology encrypt sensitive information and authenticate servers and clients to ensure a secure connection
TLS and SSL
___ and ___ use public key encryption to authenticate the server to the client
TLS and SSL
Encrypts information
Public Key
Deciphers the information
Private Key
An electronic document that verifies the identity of a person or company and confirms that they own a public key
Digital Certificate
Use certificate authorities to confirm that the certificate comes from a trusted party
Digital Certificate: TLS and SSL
A small text file that a Web site’s server puts on your computer to store information about you and your preferences
Cookie
The suppression of Web content that is considered offensive or a threat to security
Internet Censorship
___ __________ censors the content published on the Web to protect citizens and businesses
The Government
An unlawful reproduction and/or distribution of any copyrighted digital files including videos, music, e-books, and software; is stealing
Software Piracy
Belongs to the public, so the software licensing has no restrictions
Public Domain Software
Allows you to download and use the software at no cost, or for a voluntary fee; usually allows unlimited copying and distribution but for bids any changes to the program
Freeware
Initially available for a free trial for a specified period of time; generally requires that users pay a fee for continued use
Shareware
The source code is available free of charge to the general public for use and/or modification
Open Source
Provide remote access to software applications hosted on the Internet
Software as a Service and Application Service Provider (SaaS) and (ASP)
Normally restrict usage and require you to register and login with a username and a password
Software as a Service and Application Service Provider (SaaS) and (ASP)