Test 3 Quizlet Flashcards

1
Q

software used to look through the Web and uncover/fetch information about existence of web pages, how they are interlinked, and what they contain

A

web crawler

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

area where online shoppers mostly focus

A

“the Golden Triangle”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

creating a series of bogus websites, all linking back to the pages one is trying to promote

A

link fraud; also called spamdexing or link farming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

website operators generate bogus ad clicks or page views to earn ad revenue from the search engine

A

enriching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

clicking or loading a rival’s ads to exhaust their advertising budget

A

depleting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

the process of improving a page’s organic search results

A

search engine optimization (SEO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

a company that provides access to the internet for a monthly fee

A

internet service provider (ISP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

uniform resource locator

A

URL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

the protocol used for transmitting web pages over the Internet

A

HTTP (Hypertext Transfer Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

a protocol used to move files and folders over a network or the internet

A

FTP (file transfer protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

distributing a computing or networking workload across multiple systems to avoid congestions and slow performance

A

load balancing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

name of the network you’re trying to connect to

A

domain name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

the unique name given to a network node on a TCP/IP network

A

host name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

works at both ends of most Internet communication to ensure a perfect copy of a message is sent

A

TCP (transmission control protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

service on the web that provides a program that assists you with creating, editing, and hosting content on a website

A

web hosting service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Internet Corporation for Assigned Names and Numbers

A

ICANN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

top level domain

A

TLD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

registering domain names in the hope of selling them later at a higher price

A

cybersquatting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

a standardized system for tagging text files to achieve font, color, graphic, and hyperlink effects on web pages

A

HTML (hypertext markup language)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

value that is used to ID a device once connected to the internet

A

IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

internet directory service for IP addresses

A

domain name service (DNS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

when separate ISPs link their networks to swap traffic on the Internet

A

peering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

the right to determine when, and to what extent, information about you can be gathered or communicated to others

A

information privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

new European Union law on data protection and privacy for individuas

A

GDPR (General Data Protection Regulation)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

occurs when a company uses the technology intended for one purpose for another

A

function creep

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

intruding upon another’s solitude or private affairs without their consent

A

intrusion of solitude

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

use, without permission, of another’s name, likeness, or identification for the benefit of the user

A

appropriation of name or likeness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

occurs when someone publicizes a private fact about another that a reasonable person would find highly offensive

A

public disclosure of private facts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

the intentional false portrayal of someone in a way that would be offensive to a reasonable person

A

false light

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

beliefs about what is fair and what is right or wrong

A

morals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

the principles of right and wrong that guide an individual in making decisions

A

ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

do unto others as you would have them do unto you (golden rule)

A

care-based thinking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

do what’s best for the greatest number of people (utilitarianism)

A

ends-based thinking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

“would you apply tis rule to everyone?” (the categorical imperative)

A

rule-based thinking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

content created by the general public for distribution by digital media

A

UGC (user generated content)

36
Q

the effect that the words, actions, or mere presence of other people have on our thoughts, feelings, attitudes, or behavior

A

social influence

37
Q

controlled access to a company’s service that allows a developer to link their apps to that service

A

API (application programming interface)

38
Q

the global mapping of users and organizations and how they are connected

A

social graph

39
Q

research technique that analyzes the social structure that emerges from a combination of relationships among members of a given population

A

social network analysis

40
Q

why is social network analysis important

A

it allows us to segment data based on behaviors of users

41
Q

how is social network analysis done?

A

networks are represented as graphs with nodes/vertices and edges/links, and one looks for groups of highly interconnected nodes

42
Q

social entities or “actors”

43
Q

social ties (can have weight but not for now)

44
Q

sum of the shortest node paths among the cluster (how tight the group is)

45
Q

number of connections as a percent of total connections (rubustness)

46
Q

number of direct connections with other members (the most important node in the group)

A

centrality

47
Q

how many shortest paths between two nodes (facilitates connections

A

betweenness

48
Q

the number of edges connecting to a node (actors who have more ties have greater opportunities because they have more choices)

A

degree centrality

49
Q

represents how easily a person can reach all other people in his or her network through his or her direct and indirect ties =[(N-1)/sum d(y,x)]

A

closeness centrality

50
Q

plays an important role in the network that connects two or more different set of network cliques aka clusters; holds a powerful position and has significant influence over multiple sub-networks

A

betweenness centrality

51
Q

when a node has below average centrality

A

a peripheral

52
Q

when a node has an above average centrality

A

a central connector

53
Q

what causes clusters

A

induction, homophily, confounding

54
Q

something spreads from one individual to another (a style, idea, norm)

55
Q

tendency for people to form social networks with others who are similar (birds of a feather)

56
Q

people are related by something else that leads them to have this thing in common

A

confounding

57
Q

strong or weak edges between nodes represented by relationships

58
Q

the number of common friends two nodes have

A

embededness

59
Q

a conduit for information (if a person is in this position they are a broker)

A

bridging position

60
Q

cybercriminals who infiltrate systems and collect data for illegal resale

A

data harvesters

61
Q

criminals that purchase assets from data harvesters to be used for illegal financial gain

A

cash-out fraudsters

62
Q

a slang term for the computers that have become infected with malicious software and can then be used to launch a DDoS attack

63
Q

many computers collaborate to shut down a target, usually by keeping it busy or overwhelming it with incoming requests from a botnet usually

A

distributed denial-of-service (DDoS) attack

64
Q

created and built by the NSA in partnership with the CIA and Israeli intelligence in the mid-2000s

A

Stuxnet Worm

65
Q

a bad or corrupt person in a group, typically one whose behavior is likely to have a detrimental influence on his or her associates

A

bad apples

66
Q

deceiving legitimate users and tricking them into divulging restricted information or granting unauthorized access

A

social engineering

67
Q

automated social engineering scams

68
Q

attacks that exploit a vulnerability that a developer has not had time to address and patch

A

zero-dat exploit

69
Q

malicious code (trojan, worm, spyware, etc.)

70
Q

malicious SQL statements are inserted into an entry field (such as username or password login authentication fields) for execution

A

SQL injection

71
Q

tools created by hackers to make it easy to automate attacks

A

push-button hacking

72
Q

physical threats

A

dumpster diving, shoulder surfing, brute-force attacks

73
Q

process of converting readable data into unreadable characters to prevent unauthorized access

A

encryption

74
Q

flaw in OpenSSL encryption system that allowed hackers to decrypt an SSL session and discover user names, passwords, and other user data

A

heartbleed bug

75
Q

what is security

A

the set of defenses put in place to counter threats

76
Q

CIA Triad

A

confidentiality, integrity, availability

77
Q

“negative deliverable”

A

often said about security, means that firms invest in order to reduce the likelihood of a harmful event (like insurance)

78
Q

the process of matching the security threats identified to appropriate responses

A

cost-benefit analysis

79
Q

used in computer programs to bypass normal authentication and other security mechanisms in place

80
Q

appears to provide useful functionality but delivers a hidden malicious payload after installation

A

trojan horse

81
Q

employing multiple layers of controls to avoid a single point-of-failure

A

defense in depth

82
Q

SELECT

A

selects data from a database

83
Q

FROM

A

specifies which table to select or delete data from

84
Q

AS

A

renames a column or table with an alias

85
Q

WHERE

A

filters a result set to include only records that fulfill a specified condition