Privacy Flashcards
___________ concerns the collection and use of data about individuals
privacy
Three primary privacy issues:
- Accuracy
- Property
- Access
___________ relates to the responsibility of those who collect data to ensure that the data is correct
Accuracy
_________ relates to who owns the data
Property
________ relates to the responsibility of those who have data to control who is able to use that data
Access
Stored information is often refered to as _________
big data
Collection of data can be searched to find all the action of one person creating a ____________ that reveals highly detailed account of your life.
digital footprint
A vast industry of data gatherers known as __________ or ______________ now exists that collects, analyzes, and sells such personal data.
- information resellers
- information brokers
Many businesses search employees’ electronic mail and computer files using ________________. These programs record virtually everything you do on your computer.
employee-monitoring software
Many people believe that, while using the web, little can be done to invade their privacy. This is called the ______________.
illusion of anonymity
Some websites are designed to be hidden from standard search engines. These websites make up the _________ and allow communication in a secure and anonymous manner.
deep web
One part of the deep web is hidden websites that make up the __________. These websites use special software that hides a user’s IP address and makes it nearly impossible to identify who is using the site.
dark web
_______ includes the locations, or addresses, of sites that you have recently visited.
History files
____________ also known as the ________ contain web page content and instruction for displaying this content.
- temporary internet files
- browser cache
Another way web activity can be monitored is with _______. Small data files that are deposited on your hard disk from websites visited.
Cookies
__________ is one that is generated (and then read) only by the website you are currently visiting.
first-party cookie
__________ is usually generated by an advertising company affiliates with website you are currently visiting. Often referred to as ________.
- third party cookie
- tracking cookies
Most browsers also offer a ________ which ensures that your browsing activity is not recorded on your hard disk ex) Chrome: incognito mode/ Safari: private browsing
privacy mode
________ are invisible images or HTML code hidden within a web page or e-mail message, can be used to transmit information without your knowledge.
Web bugs
________ is used to describe a wide range of programs designed to secretly record and report an individual’s activities on the Internet.
spyware
_____________ is perhaps the most invasive and dangerous type of spyware.
computer monitoring software
One type of computer monitoring software, known as ________, records every activity and keystroke made on your computer system, including credit card numbers, passwords, and e-mail messages.
keylogger
Defense involves using a category of software known as _________ or ___________ which are designed to detect and remove various types of privacy threats.
- antispyware
- spy removal programs
Another aspect of Internet privacy comes from ________, the information that people voluntairly post about themselves online.
online identity