Lecture 10 Ch 9 Flashcards

0
Q

What are means to communicate without disclosing one’s identity. Or what is more difficult with the use of computers and the Internet.

A

Anonymity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

What is an individuals ability to restrict or eliminate the collection, use, and sale of confidential personal information

A

Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are cookies, global unique identifiers, Ubiquitous computing, and radio frequently identification

A

Technologies that jeopardize anonymity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are small files written to your hard disk by we’d sites visited? Ex. Tracking your browser, and gathering personal information without your consent. They can be disabled.

A

Cookies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are targeted display ads based on cookies

A

Banner ads

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the identification number produced by software or a piece of hardware. Web servers read the GUID. Users are not always aware of the GUID. If used, companies typically allow users to opt. out. Civil liberties groups and public concern have decreased the use of GUIDs.

A

Global unique identifier (GUID)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is interacting with multiple networked devices. Ex. Adjusting heat or light based on signals sent by monitors built into clothing

A

Ubiquitous computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What transmits infrared signals to create an electronic trail

A

Active badge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What uses radio waves to track a chip or tag. Used for inventory control in stores. Recognizes microchips in pets.

A

Radio frequency identification (RFID)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What unsolicited messages sent in bulk over electronic mailing systems.

A

SPAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are computer-based activities that violate the law

A

Computer crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are crimes perpetrated Through the Internet

A

Cyber crimes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the area of crime dedicated to computer crime

A

Cyber law

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is criminal access to personal information in order to impersonate someone

A

Identity theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is disgruntled employees or thieves go through the companies trash to find information they can steal called?

A

Dumpster diving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is legitimate-looking emails or websites created in an attempt to obtain confidential data

A

Phishing attacks

16
Q

What uses targeted fake emails and social engineering to trick recipients into providing personal information to enable Identity theft

A

Spear phishing

17
Q

What are programs that intentionally harm a computer system or allow individuals to gain access without permission

A

Malware

18
Q

What is software that gathers private information and tracks web use

A

Spyware

19
Q

What is a form of spyware that generates annoying pop-up and banner ads

A

Adware

20
Q

What records keystrokes to provide cyber criminals with confidence data

A

Keyloggers

21
Q

What is the code concealed inside of program that can harm or destroy files

A

Computer virus

22
Q

What attaches themselves to files?

A

File infectors

23
Q

What refers to the dangerous actions a virus performs

A

Payload

24
Q

What is attached to data files and takes advantage of application macros

A

Macro viruses

25
Q

What executes each time you start the computer?

A

Boot sector viruses

26
Q

What is spam text messages sent via a cell phone or instant message service?

A

SPIM

27
Q

What are the three kinds of rogue programs?

A

Logic bomb, time bomb, and worm

28
Q

What has hidden computer codes that sit dormant on a system until triggered

A

Logic bomb

29
Q

What are virus programs that remain dormant on a computer system unit activated

A

Time bomb

30
Q

What is similar to a virus but does not need action of a user to execute

A

Worm

31
Q

What are computer hobbyists attempting unauthorized access, generally subscribing to an unwritten code of conduct

A

Hackers

32
Q

What is the unwritten code of conduct of those who attempt unauthorized access to another’s computer?

A

Hacker ethic