chapter 9 Flashcards
Refers to the responsibility of those who have data to control who is able to use that data.
Access
Relates to the responsibility of those who collect data to ensure that the data is correct.
Accuracy
a type of program designed to prevent and detect unwanted spyware program installations and to remove those programs if installed.
Antispyware
The process of ensuring the identity of a user.
Authentication
Term given to describe the ever-growing volume of data currently being collected.
Big data
Devices that check fingerprints or retinal scans.
Biometric scanning
A collection of zombie computers.
Botnet
A collection of temporary Internet files that contain web page content and instructions for displaying this content.
Browser cache
is an act performed by a knowledgeable computer user, sometimes called a “hacker,” that illegally browses or steals a company’s or individual’s private information.
Computer crime
Guidelines for the morally acceptable use of computers in our society.
Computer ethics
Law allowing prosecution of unauthorized access to computers and databases.
Computer Fraud and Abuse Act
The most invasive and dangerous type of spyware. These programs record every activity made on your computer, including credit card numbers, bank account numbers, and e-mail messages.
Computer monitoring software
Small data files that are deposited on your hard disk from websites you have visited.
Cookies
A legal concept that gives content creators the right to control use and distribution of their work.
Copyright
One who gains unauthorized access to a computer system for malicious purposes.
Cracker
The use of the Internet, a cell phone, or other device to deliver content intended to hurt or embarrass another person.
Cyberbullying
Any criminal offense that involves a computer and a network. Criminals may be employees, outside users, hackers and crackers, or organized crime members.
Cybercrime
A politically motivated cybercrime.
Cyberterrorism
A part of the deep web consisting of sites that use special software to hide a user’s IP address and makes it nearly impossible to identify who is using the site.
Dark web
The unauthorized access of a computer network and copying files to or from the server.
Data manipulation
Protection of software and data from unauthorized tampering or damage.
Data security
Comprised of websites designed to be hidden from standard search engines to allow communication in a secure and anonymous manner.
Deep web
A variant virus in which websites are overwhelmed with data and users are unable to access the website.
Denial of service (DoS) attack
Uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user’s account.
Dictionary attack