Chapter 9: Privacy, Security and Ethics Flashcards

(98 cards)

1
Q

Technology has had a very positive impact on

A

People, but some of the impact could be negative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Most significant concerns about technology

A

1) Privacy: What are the threats to personal privacy, and how can we protect ourselves?
2) Security: How can access sensitive information be controlled, and how can we secure hardware and software?
3) Ethics: How do the actions of individual users and companies affect society?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Privacy

A

Concerns the collection and use of data about individuals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Accuracy

A

Responsibility of those who collect data and must be secure and correct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Property

A

Relates to who owns the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Access

A

Responsibility of those who control data and use that data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Large organizations compile

A

Information about us daily

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Big data is

A

Exploding and ever-growing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

90% of the data collected has been

A

Collected over the last 2 years

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Information Resellers/Brokers

A

1) Collect and sell personal data
2) Create electronic profiles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Personal information is

A

A marketable commodity, which raises many issues:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Collecting public, but

A

Personally identifying information (e.g Google’s Street View)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Spreading information without

A

Personal consent, leading to identity theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Spreading inaccurate information

A

Mistaken identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Freedom of Information Act

A

Entitlement to look at your records held by government agencies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Employee monitoring software

A

Employers can monitor email legally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A proposed law could

A

Prohibit this type of electronic monitoring or at least require the employer to notify the employee first

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Illusion of anonymity

A

People are not concerned about privacy when surfing the Internet or when sending email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

When browsing the web, critical information is stored on the hard drive in these locations, and these are included.

A

1) History Files
2) Temporary Internet Files
3) Browser cache
4) Cookies
5) Privacy Mode
6) Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

History Files

A

Include locations or addresses of sites you have recently visited

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Temporary Internet Files/Browser Cache

A

1) Saved files from visited websites
2) Offers quick re-display when you return to the site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Small data files that are deposited on your hard disk from

A

Web sites you have visited

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

First-party cookies

A

Generated only by websites you are visiting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Third-party cookies

A

Generated by an advertising company that is affiliated with the website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Tracking cookies
To keep track of your Internet activities through third party cookies
26
Privacy Modes
Ensure your browsing activity is not recorded on your hard drive
27
Recognition Mode is
Google Chrome
28
Private Browsing
Safari
29
Web bugs
Invisible images or HTML code hidden within an e-mail message or webpage
30
Spyware
1) Record and report Internet activities 2) Change the browser to manipulate what you view
31
Computer monitoring software
1) Most invasive and dangerous 2) Keystroke loggers: Record activities and keystrokes
32
Anti-Spyware programs
Detect and remove privacy threats
33
Online Identity
The information that people voluntarily post and online
34
Archiving and search features of
The Web makes it available indefinitely
35
Major Laws on Privacy
1) Gramm-Leach-Bliley Act 2) Health Insurance Portability and Accountability Act (HIPAA) 3) Family Educational Rights and Privacy Act (FERPA)
36
1) Gramm-Leach-Bliley Act
Protects personal financial information
37
2) Health Insurance Portability and Accountability Act (HIPAA)
Protects medical records
38
3) Family Educational Rights and Privacy Act (FERPA)
Resists disclosure of educational records
39
Security
Involve protecting individuals or organizations from theft and danger
40
Hackers
1) Gain unauthorized access with malicious intent 2) Not all hackers are illegal
41
Cybercrime/Computer Crime
A criminal offense that involves a computer and a network 1) Effect over 400 million people annually 2) Costs over $400 billion each year
42
Identity theft
Illegal assumption of a person's identity for economic gain
43
Internet scams
Scams over the Internet
44
Data manipulation
Unauthorized access of a computer network and copying files to or from the server
45
Ransomware
Malicious software that encrypts your computer's data and ransoms the password to the user
46
DoS, Denial of Service
Attempt to slow down or stop a computer system or network by flooding a computer or network with requests for information and data
47
DDoS, Distributed denial of Service
Coordinates several computer making repeated requests for service
48
Internet Scams
Scams using the Internet
49
Internet scams have created
Financial and legal problems for many thousands of people
50
The majority are initiated by
A mass mailing to unsuspecting individuals
51
Advance fee loans
Guaranteed low-rate available to almost anyone. After the applicant provides personal loan-related information, the loan is granted subject to an "insurance fee payment."
52
Auction fraud
Merchandise is selected, and payment is sent. Merchandise is never delivered
53
Fake Antivirus Software
A website or email warns you that you are at risk of being infected by a computer virus and need to download and install the security software they recommend. Ironically, the security software is fake and will install malicious software on your computer
54
Nigerian Scam
A classic email scam. The recipient receives an email from a wealthy foreigner in distress who needs your bank account information to safely store their wealth, and for your trouble, you will receive a large amount of money. Of course, once the scammer has your bank account information and your accounts will be drained and they will disappear
55
Social Engineering
Practice of manipulating people to divulge private data
56
Social Engineering played a crucial role in
1) Identity theft 2) Internet scams 3) Data manipulation
57
Phishing
Attempts to trick Internet users into thinking a fake but official-looking website or email is legitimate
58
Malicious Programs or Malware
Designed by crackers, computer criminals, to damage or disrupt a computer system
59
Computer Fraud and Abuse Act makes
Spreading a virus a federal offense
60
3 most common programs
1) Viruses 2) Worms 3) Trojan Horse
61
Viruses
Migrate through networks and attach to different programs
62
Worms
Fills the computer with self-replicating information
63
Trojan Horse
Programs disguised as something else
64
Malicious Hardware
Criminals use hardware for crimes
65
The most common are malicious hardware
1) Zombies 2) Rogue Wi-Fi Hotspot 3) Infect USB Flash Drives
66
Zombies
1) Computers infected by a virus, worm, or Trojan Horse 2) Botnet or Robot Network is a collection of Zombies
67
Rogue Wi-Fi Hotspot
1) Imitating legitimate free Wi-Fi 2) Capture data coming through the Rogue Wi-Fi
68
Infect USB Flash Drives
1) Left on purpose in hopes for people to pick up and use 2) Have malicious software contained on them
69
Measures to Protect Computer Security
Principle measures to ensure computer security
70
Computer Fraud and Abuse Act
1) Crime for an unauthorized person to view, copy, or damage data using computers across state lines 2) Prevents use of any government or federally insured financial institution computers
71
Restricting Access
1) Password 2) Biometric scanning
72
Dictionary Attack
It uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account
73
Biometric scanning
1) Fingerprint scanners 2) Iris (eye) scanner 3) Facial recognition
74
Ways to perform and automate important security tasks
1) Security suites 2) Firewalls 3) Password managers
75
Security suites
Provide a collection of utility programs designed to protect your privacy and security
76
Firewalls
Security buffer between a corporation's provide network and all external networks
77
Password managers
Helps to create strong password
78
Encryption: Coding information to make it unreadable, except to
Those who have the encryption key or key
79
The key will decrypt the information into
A readable format
80
Common uses for encryption
1) Email encryption 2) File encryption 3) Website encryption: HTTPS: hypertext transfer protocol secured 4) Virtual private network 5) WPA2 Wifi protected access
81
Wireless network encryption restricts access to
Authorized users
82
Anticipating Disaster
1) Physical security 2) Data security 3) Disaster recovery plan
83
Physical security protects
Hardware
84
Data security protects
Software and data from unauthorized tampering or damage
85
A disaster recovery plan describes ways to
Continue operating in the event of a disaster
86
Preventing data loss
1) Frequent backups 2) Redundant data storage
87
Store-off site in case of
Loss of equipment
88
Precautions you as an individual can and should take to make sure that you aren't the victim of high-tech criminals
1) Update software 2) Be careful when browsing 3) Be alert to email scams 4) Use antivirus software 5) Strong passwords
89
Ethics
Standards of moral conduct
90
Computer ethics
Guidelines for the morally acceptable use of computers 1) Copyright and Digital Rights Management 2) Cyberbullying 3) Plagiarism
91
Copyright
1) Gives content creators the right to control the use and distribution of their work 2) Paintings, books, music, films, and video games
92
Software piracy
Unauthorized copying and distribution of software
93
Digital rights management (DRM) controls access to
Electronic media
94
Digital Millenium Copyright Act protects
Against piracy
95
Cyberbullying
Use of the Internet to send or post content intended to harm another person
96
Plagiarism
Representing some other person's work and ideas as your own without giving credit to the original person's work and ideas
97
Most forums and comment areas on websites to
Allow users to post messages anonymously
98
Future software can
Identify you and track your moves through a mall or store