click below
click below
Normal Size Small Size show me how
DL-Unit 4
Computer Security & Privacy
Term | Definition |
---|---|
Cyber Safety | Rules and guidelines for safety and security when using the Internet |
Cyber Ethics | A broad philosophical concept that goes beyond simple right and wrong and looks towards creating safe and healthy online environments |
Cyber Security | The body of technologies, processes, and practices designed to protect networks, computers, programs, and data from attack, damage, or unauthorized access |
Back-up | To make a copy of files in case of a computer problem |
Active Content | A small program that gets installed on a computer while browsing the Internet; provides an interactive Internet experience through videos and toolbars; used to gain unauthorized access to a computer then damage data stored or install malicious software |
Computer Crimes | Computer-based activities that violate the law |
Computer Fraud | The unauthorized use of computer data for personal gain |
Computer Privacy | Keeping your personal files and data secret and secure from unauthorized viewing or tampering |
Computer Security | The protection of a computer system and its data from accidental or intentional loss and tampering |
Cookie | A short line of text that a website puts on your computer's hard drive when you access the website |
Copyright | An exclusive right granted by the federal government allowing the owner to reproduce and sell an artistic or published work |
Cyberbullying | Bullying through Internet applications and technologies such as instant messaging (IM), social networking sites, and cell phones |
Decryption | A process that reverses encryption, taking a secret message and reproducing the original plain text |
Encryption | Process of converting readable data into unreadable characters to prevent unauthorized access |
Firewall | Part of a computer system that is designed to block unauthorized access |
Hacker | A person who uses computers to gain unauthorized access to data |
Hoax | An act intended to trick or deceive, a fraud |
Intellectual Property | A work or invention that is the result of creativity, such as a manuscript or a design, to which one has rights and for which one may apply for a patent, copyright, trademark, etc. |
Internet Service Provider (ISP) | Provides you with access to the Internet |
Libel | A published false statement that is damaging to a person's reputation; a written defamation |
Logic Bomb | Computer virus triggered by the appearance or disappearance of specific data |
Online Predator | Someone who deliberately uses the internet or digital media to develop inappropriate relationships |
Password | A safeguard for access to a computer or computer program |
Phishing | An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information |
Plagiarism | Taking credit for someone else's writing or ideas |
Power Surge | A sudden increase in electrical energy affecting the current that flows to electrical outlets |
Secure Sockets Layer (SSL) | A protocol developed by Netscape for securely transmitting documents over the Internet that uses a private key to encrypt data |
Slander | False charges and malicious oral statements about someone |
Software Piracy | Unauthorized copying or distribution of copyrighted software |
Sexting | The act of sending inappropriate sexual material, usually text or images, between cell phones |
Spam | Unwanted e-mail (usually of a commercial nature sent out in bulk) |
Spyware | A type of malware that locates and saves data from users without them knowing about it |
Time Bomb | Computer virus that does not cause its damage until a certain date or until the system has been booted a certain number of times |
Trojan Horse | A program that appears desirable but actually contains something harmful |
Username | A name you make up so that you can see or do things on a website, sometimes called screen name |
Virus | A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data |
Web Browser | Allows users to access the World Wide Web |
Web Address | The address of a web page on the World Wide Web; also called a URL |
Web Page | A document which can display text, graphics, audio, video, and other elements through a web browser |
Website | A collection of related webpages |
Worm | A destructive computer virus that bores its way through a computer's files or through a computer's network |