Test 3 Quizlet Flashcards
software used to look through the Web and uncover/fetch information about existence of web pages, how they are interlinked, and what they contain
web crawler
area where online shoppers mostly focus
“the Golden Triangle”
creating a series of bogus websites, all linking back to the pages one is trying to promote
link fraud; also called spamdexing or link farming
website operators generate bogus ad clicks or page views to earn ad revenue from the search engine
enriching
clicking or loading a rival’s ads to exhaust their advertising budget
depleting
the process of improving a page’s organic search results
search engine optimization (SEO)
a company that provides access to the internet for a monthly fee
internet service provider (ISP)
uniform resource locator
URL
the protocol used for transmitting web pages over the Internet
HTTP (Hypertext Transfer Protocol)
a protocol used to move files and folders over a network or the internet
FTP (file transfer protocol)
distributing a computing or networking workload across multiple systems to avoid congestions and slow performance
load balancing
name of the network you’re trying to connect to
domain name
the unique name given to a network node on a TCP/IP network
host name
works at both ends of most Internet communication to ensure a perfect copy of a message is sent
TCP (transmission control protocol)
service on the web that provides a program that assists you with creating, editing, and hosting content on a website
web hosting service
Internet Corporation for Assigned Names and Numbers
ICANN
top level domain
TLD
registering domain names in the hope of selling them later at a higher price
cybersquatting
a standardized system for tagging text files to achieve font, color, graphic, and hyperlink effects on web pages
HTML (hypertext markup language)
value that is used to ID a device once connected to the internet
IP address
internet directory service for IP addresses
domain name service (DNS)
when separate ISPs link their networks to swap traffic on the Internet
peering
the right to determine when, and to what extent, information about you can be gathered or communicated to others
information privacy
new European Union law on data protection and privacy for individuas
GDPR (General Data Protection Regulation)
occurs when a company uses the technology intended for one purpose for another
function creep
intruding upon another’s solitude or private affairs without their consent
intrusion of solitude
use, without permission, of another’s name, likeness, or identification for the benefit of the user
appropriation of name or likeness
occurs when someone publicizes a private fact about another that a reasonable person would find highly offensive
public disclosure of private facts
the intentional false portrayal of someone in a way that would be offensive to a reasonable person
false light
beliefs about what is fair and what is right or wrong
morals
the principles of right and wrong that guide an individual in making decisions
ethics
do unto others as you would have them do unto you (golden rule)
care-based thinking
do what’s best for the greatest number of people (utilitarianism)
ends-based thinking
“would you apply tis rule to everyone?” (the categorical imperative)
rule-based thinking
content created by the general public for distribution by digital media
UGC (user generated content)
the effect that the words, actions, or mere presence of other people have on our thoughts, feelings, attitudes, or behavior
social influence
controlled access to a company’s service that allows a developer to link their apps to that service
API (application programming interface)
the global mapping of users and organizations and how they are connected
social graph
research technique that analyzes the social structure that emerges from a combination of relationships among members of a given population
social network analysis
why is social network analysis important
it allows us to segment data based on behaviors of users
how is social network analysis done?
networks are represented as graphs with nodes/vertices and edges/links, and one looks for groups of highly interconnected nodes
social entities or “actors”
nodes
social ties (can have weight but not for now)
edges
sum of the shortest node paths among the cluster (how tight the group is)
cohesion
number of connections as a percent of total connections (rubustness)
density
number of direct connections with other members (the most important node in the group)
centrality
how many shortest paths between two nodes (facilitates connections
betweenness
the number of edges connecting to a node (actors who have more ties have greater opportunities because they have more choices)
degree centrality
represents how easily a person can reach all other people in his or her network through his or her direct and indirect ties =[(N-1)/sum d(y,x)]
closeness centrality
plays an important role in the network that connects two or more different set of network cliques aka clusters; holds a powerful position and has significant influence over multiple sub-networks
betweenness centrality
when a node has below average centrality
a peripheral
when a node has an above average centrality
a central connector
what causes clusters
induction, homophily, confounding
something spreads from one individual to another (a style, idea, norm)
induction
tendency for people to form social networks with others who are similar (birds of a feather)
homophily
people are related by something else that leads them to have this thing in common
confounding
strong or weak edges between nodes represented by relationships
weight
the number of common friends two nodes have
embededness
a conduit for information (if a person is in this position they are a broker)
bridging position
cybercriminals who infiltrate systems and collect data for illegal resale
data harvesters
criminals that purchase assets from data harvesters to be used for illegal financial gain
cash-out fraudsters
a slang term for the computers that have become infected with malicious software and can then be used to launch a DDoS attack
bot net
many computers collaborate to shut down a target, usually by keeping it busy or overwhelming it with incoming requests from a botnet usually
distributed denial-of-service (DDoS) attack
created and built by the NSA in partnership with the CIA and Israeli intelligence in the mid-2000s
Stuxnet Worm
a bad or corrupt person in a group, typically one whose behavior is likely to have a detrimental influence on his or her associates
bad apples
deceiving legitimate users and tricking them into divulging restricted information or granting unauthorized access
social engineering
automated social engineering scams
phishing
attacks that exploit a vulnerability that a developer has not had time to address and patch
zero-dat exploit
malicious code (trojan, worm, spyware, etc.)
malware
malicious SQL statements are inserted into an entry field (such as username or password login authentication fields) for execution
SQL injection
tools created by hackers to make it easy to automate attacks
push-button hacking
physical threats
dumpster diving, shoulder surfing, brute-force attacks
process of converting readable data into unreadable characters to prevent unauthorized access
encryption
flaw in OpenSSL encryption system that allowed hackers to decrypt an SSL session and discover user names, passwords, and other user data
heartbleed bug
what is security
the set of defenses put in place to counter threats
CIA Triad
confidentiality, integrity, availability
“negative deliverable”
often said about security, means that firms invest in order to reduce the likelihood of a harmful event (like insurance)
the process of matching the security threats identified to appropriate responses
cost-benefit analysis
used in computer programs to bypass normal authentication and other security mechanisms in place
backdoors
appears to provide useful functionality but delivers a hidden malicious payload after installation
trojan horse
employing multiple layers of controls to avoid a single point-of-failure
defense in depth
SELECT
selects data from a database
FROM
specifies which table to select or delete data from
AS
renames a column or table with an alias
WHERE
filters a result set to include only records that fulfill a specified condition