Lecture 10 Ch 9 Flashcards
(33 cards)
What are means to communicate without disclosing one’s identity. Or what is more difficult with the use of computers and the Internet.
Anonymity
What is an individuals ability to restrict or eliminate the collection, use, and sale of confidential personal information
Privacy
What are cookies, global unique identifiers, Ubiquitous computing, and radio frequently identification
Technologies that jeopardize anonymity
What are small files written to your hard disk by we’d sites visited? Ex. Tracking your browser, and gathering personal information without your consent. They can be disabled.
Cookies
What are targeted display ads based on cookies
Banner ads
What is the identification number produced by software or a piece of hardware. Web servers read the GUID. Users are not always aware of the GUID. If used, companies typically allow users to opt. out. Civil liberties groups and public concern have decreased the use of GUIDs.
Global unique identifier (GUID)
What is interacting with multiple networked devices. Ex. Adjusting heat or light based on signals sent by monitors built into clothing
Ubiquitous computing
What transmits infrared signals to create an electronic trail
Active badge
What uses radio waves to track a chip or tag. Used for inventory control in stores. Recognizes microchips in pets.
Radio frequency identification (RFID)
What unsolicited messages sent in bulk over electronic mailing systems.
SPAM
What are computer-based activities that violate the law
Computer crime
What are crimes perpetrated Through the Internet
Cyber crimes
What is the area of crime dedicated to computer crime
Cyber law
What is criminal access to personal information in order to impersonate someone
Identity theft
What is disgruntled employees or thieves go through the companies trash to find information they can steal called?
Dumpster diving
What is legitimate-looking emails or websites created in an attempt to obtain confidential data
Phishing attacks
What uses targeted fake emails and social engineering to trick recipients into providing personal information to enable Identity theft
Spear phishing
What are programs that intentionally harm a computer system or allow individuals to gain access without permission
Malware
What is software that gathers private information and tracks web use
Spyware
What is a form of spyware that generates annoying pop-up and banner ads
Adware
What records keystrokes to provide cyber criminals with confidence data
Keyloggers
What is the code concealed inside of program that can harm or destroy files
Computer virus
What attaches themselves to files?
File infectors
What refers to the dangerous actions a virus performs
Payload