chapter 9 Flashcards

1
Q

Refers to the responsibility of those who have data to control who is able to use that data.

A

Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Relates to the responsibility of those who collect data to ensure that the data is correct.

A

Accuracy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

a type of program designed to prevent and detect unwanted spyware program installations and to remove those programs if installed.

A

Antispyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The process of ensuring the identity of a user.

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Term given to describe the ever-growing volume of data currently being collected.

A

Big data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Devices that check fingerprints or retinal scans.

A

Biometric scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A collection of zombie computers.

A

Botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A collection of temporary Internet files that contain web page content and instructions for displaying this content.

A

Browser cache

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

is an act performed by a knowledgeable computer user, sometimes called a “hacker,” that illegally browses or steals a company’s or individual’s private information.

A

Computer crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Guidelines for the morally acceptable use of computers in our society.

A

Computer ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Law allowing prosecution of unauthorized access to computers and databases.

A

Computer Fraud and Abuse Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The most invasive and dangerous type of spyware. These programs record every activity made on your computer, including credit card numbers, bank account numbers, and e-mail messages.

A

Computer monitoring software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Small data files that are deposited on your hard disk from websites you have visited.

A

Cookies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A legal concept that gives content creators the right to control use and distribution of their work.

A

Copyright

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

One who gains unauthorized access to a computer system for malicious purposes.

A

Cracker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The use of the Internet, a cell phone, or other device to deliver content intended to hurt or embarrass another person.

A

Cyberbullying

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Any criminal offense that involves a computer and a network. Criminals may be employees, outside users, hackers and crackers, or organized crime members.

A

Cybercrime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A politically motivated cybercrime.

A

Cyberterrorism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A part of the deep web consisting of sites that use special software to hide a user’s IP address and makes it nearly impossible to identify who is using the site.

A

Dark web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The unauthorized access of a computer network and copying files to or from the server.

A

Data manipulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Protection of software and data from unauthorized tampering or damage.

A

Data security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Comprised of websites designed to be hidden from standard search engines to allow communication in a secure and anonymous manner.

A

Deep web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A variant virus in which websites are overwhelmed with data and users are unable to access the website.

A

Denial of service (DoS) attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user’s account.

A

Dictionary attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
A collection of data that can be searched to reveal a highly detailed account of an individual’s life.
Digital footprint
26
Law that makes it legal for a program owner to make only his or her own backup copies of a software program. However, it is illegal for those copies to be resold or given away.
Digital Millennium Copyright Act
27
Encompasses various technologies that control access to electronic media and files.
Digital rights management (DRM)
28
Plan used by large organizations describing ways to continue operations following a disaster until normal computer operations can be restored.
Disaster recovery plan
29
A denial of service (DoS) attack that coordinates several computers making repeated requests for service to overwhelm and shut down an ISP or website.
Distributed denial of service (DDoS) attack
30
Programs that record virtually every activity on a computer system.
Employee-monitoring software
31
Coding information so that only the user can read or otherwise use it.
Encryption
32
A number used to gain access to encrypted information.
Encryption key
33
Standards of moral conduct.
Ethics
34
Software that uses specialized cameras to identify users and automatically log them in.
Facial recognition
35
A federal law that restricts disclosure of educational records.
Family Educational Rights and Privacy Act (FERPA)
36
Security hardware and software. All communications into and out of an organization pass through a special security computer, called a proxy server, to protect all systems against external threats.
Firewall
37
A cookie that is generated and then read only by the website you are currently visiting.
First-party cookie
38
Law giving citizens the right to examine data about them in federal government files, except for information restricted for national security reasons.
Freedom of Information Act of 1970
39
A law that protects personal financial information.
Gramm-Leach-Bliley Act
40
A federal law that protects medical records.
Health Insurance Portability and Accountability Act (HIPAA)
41
Created by the browser to store information on websites visited by your computer system.
History file
42
A widely used protocol for web traffic and to protect the transfer of sensitive information.
Hypertext transfer protocol secure (https)
43
The illegal assumption of someone’s identity for the purpose of economic gain.
Identity theft
44
The misconception that being selective about disclosing personal information on the Internet can prevent an invasion of personal privacy.
Illusion of anonymity
45
A privacy mode available from the Google Chrome browser.
Incognito Mode
46
Flash drive that, when connected to a computer, infects that computer with viruses.
Infected USB flash drive
47
purchase data from telecom and tech companies as well as collect data from credit bureaus, government and other public records.
Information broker
48
It gathers personal data on people and sells it to direct marketers, fund-raisers, and others, usually for a fee.
Information reseller
49
Using the Internet, a fraudulent act or operation designed to trick individuals into spending their time and money for little or no return.
Internet scam
50
Person responsible for maintaining the security of a company’s network, systems, and data. Employers look for candidates with a bachelor’s or associate’s degree in information systems or computer science and network experience.
IT security analyst
51
Another term for encryption key.
Key
52
Also known as computer monitoring software and sniffer programs. They can be loaded onto your computer without your knowledge.
Keylogger
53
is any program or file that is intentionally harmful to a computer, network or server.
Malware
54
Occurs when the electronic profile of one person is switched with another.
Mistaken identity
55
The information that people voluntarily post about themselves online.
Online identity
56
Special sequence of numbers, letters, and characters that limits access to information, such as electronic mail.
Password
57
Programs that help users create, use, and recall strong passwords.
Password manager
58
An attempt to trick Internet users into thinking a fake but official-looking website or e-mail is legitimate.
Phishing
59
Activity concerned with protecting hardware from possible human and natural disasters.
Physical security
60
A security application in Windows 10 that accepts a series of gestures over a picture of the user’s choice to gain access to a user’s account.
Picture Password
61
Representation of some other person’s work and ideas as your own without giving credit to the original source.
Plagiarism
62
Someone who engages in plagiarism.
Plagiarist
63
Computer ethics issue concerning the collection and use of data about individuals.
Privacy
64
A browser feature that eliminates history files and blocks most cookies.
Privacy mode
65
A privacy mode provided by Safari
Private Browsing
66
Computer ethics issue relating to who owns data and rights to software.
Property
67
Malicious software that encrypts your computer’s data and ransoms the password to the user.
Ransomware
68
(short for “robot network”) is a network of computers infected by malware that are under the control of a single attacking party, known as the “bot-herder.”
Robot network
69
Imitation hotspot intended to capture personal information.
Rogue Wi-Fi hotspot
70
The protection of information, hardware, and software.
Security
71
A collection of utility programs designed to protect your privacy and security while you are on the web.
Security suites
72
The practice of manipulating people to divulge private data.
Social engineering
73
Unauthorized copying of programs for personal gain.
Software piracy
74
Program such as Spybot and Spysweeper, designed to detect web bugs and monitor software.
Spy removal program
75
Wide range of programs designed to secretly record and report an individual’s activities on the Internet.
Spyware
76
File that has web page content and instructions for displaying this content.
Temporary Internet file
77
A cookie generated by an advertising company that is affiliated with the website you are currently visiting. Often also referred to as a tracking cookie.
Third-party cookie
78
a specialized type of cookie that can be shared by more than one website or service.
Tracking cookie
79
Program that is not a virus but is a carrier of virus(es). appear as free computer games, screen savers, or antivirus programs. Once downloaded, they locate and disable existing virus protection and then deposit the virus.
Trojan horse
80
A type of authentication that requires two types (or factors) of data to verify a user’s identity.
Two-factor authentication
81
A type of authentication that uses one type of authentication twice.
Two-step authentication
82
Creates a secure private connection between a remote user and an organization’s internal network.
Virtual private network (VPN)
83
Hidden instructions that migrate through networks and operating systems and become embedded in different programs. They may be designed to destroy data or simply to display messages.
Virus
84
Program hidden in the HTML code for a web page or e-mail message as a graphical image. They collect information on the users and report back to a predefined server.
Web bug
85
Restricts access to authorized users on wireless networks.
Wireless network encryption
86
Virus that doesn’t attach itself to programs and databases but fills a computer system with self-replicating information, clogging the system so that its operations are slowed or stopped.
Worm
87
A secure encryption protocol.
WPA2 (Wi-Fi Protected Access 2)
88
A computer infected by a virus, worm, or Trojan horse that allows it to be remotely controlled for malicious purposes.
Zombie