Chap 5 Flashcards
Netiquette
includes the code of acceptable behaviors
users should follow while on the Internet; that is, it is the conduct expected of individuals while online.
set of legal and moral guidelines that
govern the use of technology, including computers,
mobile devices, information systems, and databases
Digital ethics
Cyberbullying
a form of bullying that involves digital
devices and platforms such as social media sites, online forums, messaging apps, and email.
one state that has attempted to define and
enact punishment for cyberbullying. Missouri statute
defines cyberbullying as bullying “through the
transmission of a communication, including but not limited to, a message, text, sound, or image by means of an electronic device.”
Missouri
Distracted driving
driving a vehicle while
focusing on other activities, typically involving an
electronic device such as a cell phone.
a document that lists guidelines and repercussions
of using the Internet and other digital company resources, including network storage and email servers
distributed in part to reduce an organization’s
liability and to clarify what is and is not a fireable offense
AUP or Acceptable Use Policies (AUPs)
How to discourage plagarism
To help discourage plagiarism of other people’s work,
teachers often require students to submit papers using a service, such as Turnitin, that automatically checks for plagiarized passages; Turnitin can also help students check for uncited passages and more before submitting
Your green computing efforts should include:
- Purchasing and using products with an ENERGY STAR label
- Shutting down your computers and devices overnight or when not in use.
- Donating computer equipment
- Using paperless communication
- Recycling paper, toner and ink cartridges, computers, mobile devices, and printers
- Telecommuting and using videoconferencing for meetings
risk
any possibility that something might occur resulting
in an injury or a loss
digital security risk
any event or action that could cause
a loss of or damage to a computer or mobile device
hardware, software, data, information, or processing
capability
Types of digital security risks
threats to our information, physical health, mental health, and the environment.
Any illegal act involving the use of a computer or related devices
computer crime
an online or Internet-based illegal act
cybercrime
Software used by cybercriminals
crimeware
the practice of protection against digital
threats, including unauthorized or illegal access to data.
Cybersecurity
discovery, collection, and analysis of evidence found on computers and networks.
Digital forensics, or cyber forensics
knowledge of the law, technical experience with many types of hardware and software products, superior communication skills, familiarity with corporate structures and policies, a willingness to learn and update skills, and a knack for problem-solving
A digital forensics examiner
attackers who are strongly motivated by
principles or beliefs
Hacktivists
a part of the web that is accessed using
specialized software, where users and website operators can remain anonymous while performing illegal actions
dark web
more general and common term used to
describe individuals who launch attacks against other
users and their computers
Threat actor
a period of time during which an
individual refrains from using technology
digital detox
malicious software, consists of
programs that act without a user’s knowledge and
deliberately alter the operations of computers and mobile devices
Malware
A program that displays an online advertisement in a banner, pop-up window, or pop under window on webpages, email messages, or other Internet services
Adware
A program that hides in a computer or mobile device and allows someone from a remote
location to take full control of the computer or device
Rootkit