Online Safety, Security, Ethics, and Etiquette Flashcards
a network of zombie computers that have been taken over by a robot
Internet bots
generic term for spy ware and adware
malware
advertising, automatically delivers advertisements
Adware
that function by spying on user activity without their knowledge
spyware
program design to replicate by attaching itself into other computer problem
virus
it can be injected inti a network bye any type like USB
worm
A TYPE OF MALWARE THAT DISGUISES ITSELF AS
TROJAN HORSE
ALSO KNOWN AS LOVE BUG OR LOVE LETTER.
ILOVEYOU VIRUS
A MALFUNCTION ON A COMPUTER SYSTEM THROUGH ITS RUNTIME.
COMPUTER BUG
THE USE OF THE INTERNET OR OTHER ELECTRONIC DEVICE TO HARASS OR STALK INDIVIDUAL, GROUP OR ORGANIZATION.
CYBER STALKING
THE ACT ORTORMRORT ORMENTING,THREATENING, HARRASSING
CYBER BULLYING
DESCRIBES A CRIMINAL WHO IMPERSONATES ANOTHER INDIVIDUAL OR
SPOOFING
HAPPENS WHEN MALWARE OR SPYWARE REPLACES A WEB USERS BROWSER HOMEPAGE THAT REDIRECTS THE USE TO UNWANTED.
BROWSING HIJACKING
HAPPENS WHEN CRIMINAL IMPERSONATES A USER BY STEALING HIS OR HER PERSONAL INFORMATION TO WITHDRAW MONEY
IDENTITY THEFT
ENABLES A USER TO OBTAIN INFORMATION ABOUT ANOTHER COMPUTER ACTIVITIES BY TRANSMITTING DATA CORRECTLY TO ONES HARD DRIVE.
SPYWARE