click below
click below
Normal Size Small Size show me how
Computer Concepts
Ch. 09 Privacy, Security, and Ethics
Question | Answer |
---|---|
access | who controls access to data |
accuracy | who is responsible to ensure data is correct |
antispyware / spy removal program | designed to detect and remove various types of privacy threats. |
big data | The ever-growing volume of data |
biometric scanning | such as fingerprint and iris (eye) scanners. |
botnet / robot network | A collection of zombie computers |
browser cache / temporary Internet file | contain website content and display instructions |
computer crime / Cybercrime | An illegal action involving special knowledge of computer technology. |
computer ethics | guidelines for the morally acceptable use of computers in our society. We are all entitled to ethical treatment. |
Computer Fraud and Abuse Act | makes spreading a virus a federal offense & helps protect against data manipulation |
computer monitoring software | the most invasive and dangerous type of spyware. |
cookies | small data files that are deposited on your hard disk from websites you have visited. |
copyright | a legal concept that gives content creators the right to control use and distribution of their work. |
cracker / Malicious Program | a computer criminal who creates and distributes malicious programs. |
cyberbullying | the use of the Internet, smartphones, or other devices to send or post content intended to hurt or embarrass another person. |
data security | concerned with protecting software and data from unauthorized tampering or damage. |
denial of service (DoS) attack | An attack that occurs when legitimate users are denied access to a computer system because a hacker is repeatedly making requests of that computer system that tie up its resources and deny legitimate users access. |
dictionary attack | uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user’s account. |
Digital Millennium Copyright Act | establishes the right of a program owner to make a backup copy of any program and disallows the creation of copies to be sold or given away. It is also illegal to download copyright-protected music and videos from the Internet. |
digital rights management (DRM) | is a collection of technologies designed to prevent copyright violations. Typically, DRM is used to (1) control the number of devices that can access a given file and (2) limit the kinds of devices that can access a file |
disaster recovery plan | describing ways to continue operating until normal computer operations can be restored. |
electronic profile | compiled from databases to provide highly detailed and personalized descriptions of individuals |
employee-monitoring software | Many organizations monitor employee e-mail and computer files using special software |
encryption | the process of coding information to make it unreadable except to those who have a special piece of information known as an encryption key |
encryption key / key | a special piece of information |
ethics | standards of moral conduct. |
Family Educational Rights and Privacy Act (FERPA) | restricts disclosure of educational records. |
firewall / security suites / password managers | A software program or hardware device designed to prevent unauthorized access to computers or networks. |
first-party cookie | is one that is generated (and then read) only by the website you are currently visiting. |
Freedom of Information Act | entitles individuals access to governmental records relating to them |
Gramm-Leach-Bliley Act | protects personal financial information |
hacker | Someone who gains unauthorized access to computers that contain information about us is commonly |
Health Insurance Portability and Accountability Act (HIPAA) | protects medical records |
history file | record sites visited |
(hypertext transfer protocol secure) | requires browsers and websites to encrypt all messages |
identity theft | the illegal assumption of someone’s identity for the purposes of economic gain. |
illusion of anonymity | Many people believe that, while using the web, little can be done to invade their privacy. |
Incognito Mode | privacy mode. Google Chrome provides Incognito Mode accessible from the Chrome menu |
information broker(reseller) | collect and sell personal data. |
Internet scam | a scam using the Internet. |
IT security analyst | responsible for maintaining the security of a company’s network, systems, and data. Employers look for candidates with a bachelor’s or associate’s degree in information systems or computer science and network experience. |
keystroke logger | one type of computer monitoring software |
malware (malicious software) | include viruses, worms, and Trojan horses. |
mistaken identity | an electronic profile of one person is switched with another. |
online identity | the information that people voluntarily post about themselves online. With the popularity of social networking, blogging, and photo- and video-sharing sites, many people post intimate details of their lives without considering the consequences. |
password | secret words or phrases (including numbers, letters, and special characters) that must be keyed into a computer system to gain access. |
phishing | attempts to trick Internet users into thinking a fake but official-looking website or e-mail is legitimate. |
physical security | concerned with protecting hardware from possible human and natural disasters. Data security is concerned with protecting software and data from unauthorized tampering or damage. |
plagiarism | representing some other person’s work and ideas as your own without giving credit to the original source. |
privacy | concerns the collection and use of data about individuals. |
privacy mode | ensures that your browsing activity is not recorded on your hard disk. |
Private Browsing | privacy mode. Safari provides Private Browsing accessible from the Safari option on the main menu. |
property | who owns data |
rogue Wi-Fi hotspot | imitate legitimate hotspots to capture personal information. |
scam | a fraudulent or deceptive act or operation designed to trick individuals into providing personal information or spending their time and money for little or no return. |
security | involves protecting individuals and organizations from theft and danger. |
software piracy | he unauthorized copying and distribution of software. |
spyware | secretly records and reports Internet activities. |
third-party cookie / tracking cookies | usually generated by an advertising company that is affiliated with the website you are currently visiting. These cookies are used by the advertising company to keep track of your web activity as you move from one site to the next. |
Trojan horse | programs that appear to be harmless; however, they contain malicious programs. |
virtual private network (VPN) | encrypt connections between company networks and remote users such as workers connecting from home. This connection creates a secure virtual connection to a company LAN across the Internet. |
virus | programs that migrate through networks and operating systems, and most attach themselves to different programs and databases. |
web bugs | invisible images or HTML code hidden within a web page or e-mail message, can be used to transmit information without your knowledge |
wireless network encryption | Restricts access to authorized users on wireless networks. |
worm | programs that simply replicate themselves over and over again. Once active in a network, the self-replicating activity clogs computers and networks until their operations are slowed or stopped |
WPA2 (Wi-Fi Protected Access 2) | the most widely used wireless network encryption for home wireless networks. It is typically established for a wireless network through the network’s wireless router. |
zombie | remotely controlled infected computers used for malicious purposes. |
whole-house surge protector | A surge protector that's installed on (or near) the breaker panel of a home and that protects all electronic devices in the home from power surges. |
white-hat hacker (ethical hacker) | A hacker who breaks into system just for the challenge of it(who doesn't wish to steal or wreck havoc on the system). Such hackers tout themselves as experts who are performing a service for society by helping company realize the vulnerabilities in system |
virus signature | A portion of the virus code that's unique to a particular computer virus and that makes it identifiable by antivirus software. |
time bomb | A virus that's triggered by the passage of time or on a certain date. |
surge protector | A device that protects computers and other electronic devices from power surges. |
stealth virus | A virus that temporarily erases its code from the files where it resides and hides in the active memory of the computer. |
spear phishing | A targeted phishing attack that sends e-mails to people known to be customers of a company. Such attacks have a much greater chance of successfully getting individuals to reveal sensitive data. |
spam filter | An option you can select in your e-mail account that places known or suspected spam messages into a folder other than your inbox. |
spam | Unwanted or junk e-mail. |
social engineering | Any technique that uses social skills to generate human interaction for the purpose of enticing individuals to reveal sensitive information. |
script | A list of commands (mini-programs or macros) that can be executed on a computer without user interaction. |
scareware | A type of malware that's downloaded onto your computer and that tries to convince you that your computer is infected with a virus or other type of malware. |
rootkit | Programs that allow hacker to gain access to the computer and take almost complete control of it without your knowledge. These programs are designed to subvert normal login procedure to a computer and to hide their operations from normal detection methods |
quarantining | The placement (by antivirus) of a computer virus in a secure area on the hard drive so that it won't spread infection to other files. |
program files | Files that are used in the running of software programs and that do not store data. |
pretexting | The act of creating an invented scenario (the pretext) to convince someone to divulge information. |
polymorphic virus | A virus that changes its virus signature (the binary pattern that makes the virus identifiable) every time it infects a new file. This makes it more difficult for antivirus programs to detect the virus. |
pharming | Planting malicious code on a computer that alerts the browser's ability to find web address and that directs users to bogus website. |
personal firewall | A firewall specifically designed for home networks. |
packet filtering | Firewalls can be configured so that they filter out packets sent to specific logical ports in a process. |
packet analyzer (sniffer) | A computer hardware device or software program designed to detect and record digital information being transmitted over a network. |
network address translation (NAT) | A process that firewalls use to assign internal Internet protocol addresses on a network. |
multipartite virus | Literally meaning "multipart" virus; a type of computer virus that attempts to infect computers using more than one method. |
master boot record | A small program that runs whenever a computer boots up. |
malware | Software that's intended to render a system temporarily or permanently useless or to penetrate a computer system completely for purposes of information gathering. Examples include spyware, viruses, worms, and Trojan horses. |
macro virus | A virus that's distributed by hiding it inside a macro. |
logic bomb | A computer virus that runs when a certain set of conditions is met, such as when a program launched a specific number of times. |
logical port blocking | A condition in which a firewall is configured to ignore all incoming packets that request access to a certain port so that no unwanted requests will get through to the computer. |
logical port | A viral communications gateway or path that enables a computer to organize requests for information (such as web page downloads and e-mail routing) from other networks or computers. |
keystroke logger (keylogger) | A type of spyware program that monitors keystrokes with the intent of stealing passwords, login IDs, or credit card information. |
inoculation | A process used by antivirus software; compares old and current qualities of files to detect viral activity. |
incremental backup (partial backup) | A type of backup that only backs up files that have changed since the last time files were backed up. |
image backup (system backup) | A copy of an entire computer system, created for restoration purpose. |
identify theft | The process by which someone uses personal information about someone else (such as the victim's name, address, and Social Security number) to assume the victim's identity for the purpose of defrauding another. |
grey-hat hacker | A cross between black and white - a hacker who will often illegally break into systems merely to flaunt his or her expertise to the administrator of the system he or she penetrated or to attempt to sell his or her services in repairing security branches. |
geotag | Data attached to a photograph that indicates the latitude and longitude where you were standing when you took the photo. |
encryption virus | A malicious program that searches for common data files and compress them into a file using a complex encryption key, thereby rendering the files unusable. |
e-mail virus | A virus transmitted by e-mail that often uses the address book in the victim's e-mail system to distribute itself. |
drive-by download | The use of malicious software to attack a computer by downloading harmful programs onto a computer, without the user's knowledge, while they are surfing a website. |
Distributed denial-of-service (DDOS) attack | An automated attack that's launched from more than one zombie computer at the same time. |
data file | A file that contains stored data. |
data breach | When sensitive or confidential information is copied, transmitted, or viewed by an individual who is not authorized to handle the data. |
cyberloafing | Doing anything with a computer that's unrelated to a job (such as playing video games) while one's supposed to be working. Also called cyberslacking. |
cybercriminal | An individual who uses computers, networks, and the Internet to perpetrate crime. |
computer forensics | The application of computer systems and techniques to gather potential legal evidence; a law enforcement specialty used to fight high-tech crime. |
botnet | A large group of software applications (called robots or bots) that run without user intervention on a large number of computers. |
boot-sector virus | A virus that replicates itself into a master boot record of a flash drive or hard drive. |
black-hat hacker | A hacker who uses his or her knowledge to destroy information of for illegal gain. |
biometric authentication device | A device that uses some unique characteristics of human biology to identify authorized users. |
backup | A copy of a computer file that can be used to replace the original if it's lost or damaged. |
backdoor program | Program that enables a hacker to take complete control of a computer without a legitimate user's knowledge or permission. |
antivirus system | Software specially designed to detect viruses and protect a computer and files from harm. |
adware | A program that downloads on your computer, when a user installs a freeware program, game, or utility. Generally, adware enables sponsored advertisements to appear in a section of a browser window or as a pop-up ad. |