click below
click below
Normal Size Small Size show me how
Ethics CT
Computer Tech Ethics
Question | Answer |
---|---|
Criminal Hackers (Or Black Hats) | professional hackers whose goal is to make money and/or harm the interests of others |
Personal Data Collection | Collecting information about people such as their name, address and phone number. |
Cyber-Terrorist Hackers | violent extremists who use hacking as a tool to further their terrorist purposes |
Personal Identity Theft | Stealing someone's information such as their social security number or credit card number |
Nation-State Hackers | known as cyber-spies, who hack bon behalf of the interests of their nation. Many countries, including the US, hire hackers to defend government networks and computers and/or to actively infiltrate other gov’ts networks and computers |
Copyright | A legal right granted to the creator, publisher or distributor of a work. |
Ethical Hackers (or White Hats) | who are often hired by companies as consultants to test system security |
Piracy | The unauthorized and illegal reproduction, sale, distribute or other use of copyrighted work. |
Crackers | who break into computers and networks illegally |
Plagiarism | The act of taking work written or created by someone else and using it as your own. |
Hacker Gangs | organized groups that hack each other, web sites, and companies |
Hactivists | those whose hacking goals are to further a social or political cause |
Malware | Software designed to infiltrate or damage a computer system, without the owner's consent and most commonly in the form of a virus, trojan, or spyware. |
Spam | An unsolicited e-mail sent via bulk e-mail. |
Viruses | A program that can replicate itself and spreads itself by means of a transferable host. |
Spyware | Malicious software that subverts the computer’s operation for the benefit of a third party. |
Phishing | An attempt to fraudulently acquire confidential information, such as passwords and credit card details, by masquerading as a trustworthy person or business in an apparently official electronic communication, such as an email or an instant message. |
Pharming | Software that allows a hacker to: acquire the domain name for a site and redirect that website’s traffic to another website for the purpose of gaining access to usernames, passwords, etc. |
Trojans | A malicious program that is disguised as a legitimate program. |
Worms | A self-replicating computer program that is self-contained and does not need to be part of another program to propagate itself. |
Backdoors | Method of remaining hidden on a computer while bypassing normal authentication and securing remote access to a computer. |
Zombie Computers | A computer attached to the Internet that is under remote direction by an illegitimate user. |