Chapter 15: Computer Security and Privacy Flashcards

1
Q

Computer monitoring software

A

Software that can be used to record an individual’s computer usage, such as capturing images of the screen, recording the actual keystrokes used, or creating a summary of Web sites and programs accessed. (p617)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

digital counterfeiting

A

The use of computers or other types of digital equipment to make illegal copies of currency, checks, collectibles, and other items. (p603)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

disaster recovery plan

A

A written plan that describes the steps a company will take following the occurrence of a disaster. (p601)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

e-mail filter

A

A tool that automatically sorts your incoming e-mail messages based on specific criteria. (p613)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

electronic profiling

A

Using electronic means to collect a variety of in-depth information about an individual, such as name, address, income, and buying habits. (p609)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Employee monitoring

A

Observing or reviewing employees’ actions while they are on the job. (p621)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

full disk encryption (FDE)

A

A technology that encrypts everything stored on a storage medium automatically, without any user interaction. (p595)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

government databases

A

A collection of data about people that is collected and maintained by the government. (p608)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

hardware theft

A

The theft of computer hardware. (p592)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

information privacy

A

The rights of individuals and companies to control how information about them is collected and used. (p606)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Marketing databases

A

A collection of data about people that is stored in a large database and used for marketing purposes. (p607)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

opt in

A

To request that you be included in marketing activities or that your information be shared with other companies. (p615)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

opt out

A

To request that you be removed from marketing activities or that your information not be shared with other companies. (p614)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Presence technology

A

Technology that enables one computing device (such as a computer or mobile device) to locate and identify the current status of another device on the same network. (p622)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Privacy

A

The state of being concealed or free from unauthorized intrusion. (p606)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

privacy policy

A

A policy, commonly posted on a company’s Web site, that explains how personal information provided to that company will be used. (p609)

17
Q

ruggedized devices

A

A device (such as a portable computer or mobile phone) that is designed to withstand much more physical abuse than its conventional counterpart. (p598)

18
Q

self-encrypting hard drive

A

A hard drive that uses full disk encryption (FDE). (p595)

19
Q

Software piracy

A

The unauthorized copying of a computer program. (p602)

20
Q

Spam

A

Unsolicited, bulk e-mail sent over the Internet. (p610)

21
Q

spam filters

A

An e-mail filter used to redirect spam from a user’s Inbox. (p613)

22
Q

surge suppressor

A

A device that protects hardware from damage due to electrical fluctuations. (p598)

23
Q

system failure

A

The complete malfunction of a computer system. (p592)

24
Q

throw-away e-mail address

A

An e-mail address used only for nonessential purposes and activities that may result in spam; the address can be disposed of and replaced if spam becomes a problem. (p611)

25
Q

uninterruptible power supply (UPS)

A

A device containing a built-in battery that provides continuous power to a computer and other connected components when the electricity goes out. (p598)

26
Q

video surveillance

A

The use of video cameras to monitor activities of individuals, such as employees or individuals in public locations, for work-related or crime-prevention purposes. (p619)