Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Ch. 09 Privacy, Security, and Ethics

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Question
Answer
access   who controls access to data  
🗑
accuracy   who is responsible to ensure data is correct  
🗑
antispyware / spy removal program   designed to detect and remove various types of privacy threats.  
🗑
big data   The ever-growing volume of data  
🗑
biometric scanning   such as fingerprint and iris (eye) scanners.  
🗑
botnet / robot network   A collection of zombie computers  
🗑
browser cache / temporary Internet file   contain website content and display instructions  
🗑
computer crime / Cybercrime   An illegal action involving special knowledge of computer technology.  
🗑
computer ethics   guidelines for the morally acceptable use of computers in our society. We are all entitled to ethical treatment.  
🗑
Computer Fraud and Abuse Act   makes spreading a virus a federal offense & helps protect against data manipulation  
🗑
computer monitoring software   the most invasive and dangerous type of spyware.  
🗑
cookies   small data files that are deposited on your hard disk from websites you have visited.  
🗑
copyright   a legal concept that gives content creators the right to control use and distribution of their work.  
🗑
cracker / Malicious Program   a computer criminal who creates and distributes malicious programs.  
🗑
cyberbullying   the use of the Internet, smartphones, or other devices to send or post content intended to hurt or embarrass another person.  
🗑
data security   concerned with protecting software and data from unauthorized tampering or damage.  
🗑
denial of service (DoS) attack   An attack that occurs when legitimate users are denied access to a computer system because a hacker is repeatedly making requests of that computer system that tie up its resources and deny legitimate users access.  
🗑
dictionary attack   uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user’s account.  
🗑
Digital Millennium Copyright Act   establishes the right of a program owner to make a backup copy of any program and disallows the creation of copies to be sold or given away. It is also illegal to download copyright-protected music and videos from the Internet.  
🗑
digital rights management (DRM)   is a collection of technologies designed to prevent copyright violations. Typically, DRM is used to (1) control the number of devices that can access a given file and (2) limit the kinds of devices that can access a file  
🗑
disaster recovery plan   describing ways to continue operating until normal computer operations can be restored.  
🗑
electronic profile   compiled from databases to provide highly detailed and personalized descriptions of individuals  
🗑
employee-monitoring software   Many organizations monitor employee e-mail and computer files using special software  
🗑
encryption   the process of coding information to make it unreadable except to those who have a special piece of information known as an encryption key  
🗑
encryption key / key   a special piece of information  
🗑
ethics   standards of moral conduct.  
🗑
Family Educational Rights and Privacy Act (FERPA)   restricts disclosure of educational records.  
🗑
firewall / security suites / password managers   A software program or hardware device designed to prevent unauthorized access to computers or networks.  
🗑
first-party cookie   is one that is generated (and then read) only by the website you are currently visiting.  
🗑
Freedom of Information Act   entitles individuals access to governmental records relating to them  
🗑
Gramm-Leach-Bliley Act   protects personal financial information  
🗑
hacker   Someone who gains unauthorized access to computers that contain information about us is commonly  
🗑
Health Insurance Portability and Accountability Act (HIPAA)   protects medical records  
🗑
history file   record sites visited  
🗑
(hypertext transfer protocol secure)   requires browsers and websites to encrypt all messages  
🗑
identity theft   the illegal assumption of someone’s identity for the purposes of economic gain.  
🗑
illusion of anonymity   Many people believe that, while using the web, little can be done to invade their privacy.  
🗑
Incognito Mode   privacy mode. Google Chrome provides Incognito Mode accessible from the Chrome menu  
🗑
information broker(reseller)   collect and sell personal data.  
🗑
Internet scam   a scam using the Internet.  
🗑
IT security analyst   responsible for maintaining the security of a company’s network, systems, and data. Employers look for candidates with a bachelor’s or associate’s degree in information systems or computer science and network experience.  
🗑
keystroke logger   one type of computer monitoring software  
🗑
malware (malicious software)   include viruses, worms, and Trojan horses.  
🗑
mistaken identity   an electronic profile of one person is switched with another.  
🗑
online identity   the information that people voluntarily post about themselves online. With the popularity of social networking, blogging, and photo- and video-sharing sites, many people post intimate details of their lives without considering the consequences.  
🗑
password   secret words or phrases (including numbers, letters, and special characters) that must be keyed into a computer system to gain access.  
🗑
phishing   attempts to trick Internet users into thinking a fake but official-looking website or e-mail is legitimate.  
🗑
physical security   concerned with protecting hardware from possible human and natural disasters. Data security is concerned with protecting software and data from unauthorized tampering or damage.  
🗑
plagiarism   representing some other person’s work and ideas as your own without giving credit to the original source.  
🗑
privacy   concerns the collection and use of data about individuals.  
🗑
privacy mode   ensures that your browsing activity is not recorded on your hard disk.  
🗑
Private Browsing   privacy mode. Safari provides Private Browsing accessible from the Safari option on the main menu.  
🗑
property   who owns data  
🗑
rogue Wi-Fi hotspot   imitate legitimate hotspots to capture personal information.  
🗑
scam   a fraudulent or deceptive act or operation designed to trick individuals into providing personal information or spending their time and money for little or no return.  
🗑
security   involves protecting individuals and organizations from theft and danger.  
🗑
software piracy   he unauthorized copying and distribution of software.  
🗑
spyware   secretly records and reports Internet activities.  
🗑
third-party cookie / tracking cookies   usually generated by an advertising company that is affiliated with the website you are currently visiting. These cookies are used by the advertising company to keep track of your web activity as you move from one site to the next.  
🗑
Trojan horse   programs that appear to be harmless; however, they contain malicious programs.  
🗑
virtual private network (VPN)   encrypt connections between company networks and remote users such as workers connecting from home. This connection creates a secure virtual connection to a company LAN across the Internet.  
🗑
virus   programs that migrate through networks and operating systems, and most attach themselves to different programs and databases.  
🗑
web bugs   invisible images or HTML code hidden within a web page or e-mail message, can be used to transmit information without your knowledge  
🗑
wireless network encryption   Restricts access to authorized users on wireless networks.  
🗑
worm   programs that simply replicate themselves over and over again. Once active in a network, the self-replicating activity clogs computers and networks until their operations are slowed or stopped  
🗑
WPA2 (Wi-Fi Protected Access 2)   the most widely used wireless network encryption for home wireless networks. It is typically established for a wireless network through the network’s wireless router.  
🗑
zombie   remotely controlled infected computers used for malicious purposes.  
🗑
whole-house surge protector   A surge protector that's installed on (or near) the breaker panel of a home and that protects all electronic devices in the home from power surges.  
🗑
white-hat hacker (ethical hacker)   A hacker who breaks into system just for the challenge of it(who doesn't wish to steal or wreck havoc on the system). Such hackers tout themselves as experts who are performing a service for society by helping company realize the vulnerabilities in system  
🗑
virus signature   A portion of the virus code that's unique to a particular computer virus and that makes it identifiable by antivirus software.  
🗑
time bomb   A virus that's triggered by the passage of time or on a certain date.  
🗑
surge protector   A device that protects computers and other electronic devices from power surges.  
🗑
stealth virus   A virus that temporarily erases its code from the files where it resides and hides in the active memory of the computer.  
🗑
spear phishing   A targeted phishing attack that sends e-mails to people known to be customers of a company. Such attacks have a much greater chance of successfully getting individuals to reveal sensitive data.  
🗑
spam filter   An option you can select in your e-mail account that places known or suspected spam messages into a folder other than your inbox.  
🗑
spam   Unwanted or junk e-mail.  
🗑
social engineering   Any technique that uses social skills to generate human interaction for the purpose of enticing individuals to reveal sensitive information.  
🗑
script   A list of commands (mini-programs or macros) that can be executed on a computer without user interaction.  
🗑
scareware   A type of malware that's downloaded onto your computer and that tries to convince you that your computer is infected with a virus or other type of malware.  
🗑
rootkit   Programs that allow hacker to gain access to the computer and take almost complete control of it without your knowledge. These programs are designed to subvert normal login procedure to a computer and to hide their operations from normal detection methods  
🗑
quarantining   The placement (by antivirus) of a computer virus in a secure area on the hard drive so that it won't spread infection to other files.  
🗑
program files   Files that are used in the running of software programs and that do not store data.  
🗑
pretexting   The act of creating an invented scenario (the pretext) to convince someone to divulge information.  
🗑
polymorphic virus   A virus that changes its virus signature (the binary pattern that makes the virus identifiable) every time it infects a new file. This makes it more difficult for antivirus programs to detect the virus.  
🗑
pharming   Planting malicious code on a computer that alerts the browser's ability to find web address and that directs users to bogus website.  
🗑
personal firewall   A firewall specifically designed for home networks.  
🗑
packet filtering   Firewalls can be configured so that they filter out packets sent to specific logical ports in a process.  
🗑
packet analyzer (sniffer)   A computer hardware device or software program designed to detect and record digital information being transmitted over a network.  
🗑
network address translation (NAT)   A process that firewalls use to assign internal Internet protocol addresses on a network.  
🗑
multipartite virus   Literally meaning "multipart" virus; a type of computer virus that attempts to infect computers using more than one method.  
🗑
master boot record   A small program that runs whenever a computer boots up.  
🗑
malware   Software that's intended to render a system temporarily or permanently useless or to penetrate a computer system completely for purposes of information gathering. Examples include spyware, viruses, worms, and Trojan horses.  
🗑
macro virus   A virus that's distributed by hiding it inside a macro.  
🗑
logic bomb   A computer virus that runs when a certain set of conditions is met, such as when a program launched a specific number of times.  
🗑
logical port blocking   A condition in which a firewall is configured to ignore all incoming packets that request access to a certain port so that no unwanted requests will get through to the computer.  
🗑
logical port   A viral communications gateway or path that enables a computer to organize requests for information (such as web page downloads and e-mail routing) from other networks or computers.  
🗑
keystroke logger (keylogger)   A type of spyware program that monitors keystrokes with the intent of stealing passwords, login IDs, or credit card information.  
🗑
inoculation   A process used by antivirus software; compares old and current qualities of files to detect viral activity.  
🗑
incremental backup (partial backup)   A type of backup that only backs up files that have changed since the last time files were backed up.  
🗑
image backup (system backup)   A copy of an entire computer system, created for restoration purpose.  
🗑
identify theft   The process by which someone uses personal information about someone else (such as the victim's name, address, and Social Security number) to assume the victim's identity for the purpose of defrauding another.  
🗑
grey-hat hacker   A cross between black and white - a hacker who will often illegally break into systems merely to flaunt his or her expertise to the administrator of the system he or she penetrated or to attempt to sell his or her services in repairing security branches.  
🗑
geotag   Data attached to a photograph that indicates the latitude and longitude where you were standing when you took the photo.  
🗑
encryption virus   A malicious program that searches for common data files and compress them into a file using a complex encryption key, thereby rendering the files unusable.  
🗑
e-mail virus   A virus transmitted by e-mail that often uses the address book in the victim's e-mail system to distribute itself.  
🗑
drive-by download   The use of malicious software to attack a computer by downloading harmful programs onto a computer, without the user's knowledge, while they are surfing a website.  
🗑
Distributed denial-of-service (DDOS) attack   An automated attack that's launched from more than one zombie computer at the same time.  
🗑
data file   A file that contains stored data.  
🗑
data breach   When sensitive or confidential information is copied, transmitted, or viewed by an individual who is not authorized to handle the data.  
🗑
cyberloafing   Doing anything with a computer that's unrelated to a job (such as playing video games) while one's supposed to be working. Also called cyberslacking.  
🗑
cybercriminal   An individual who uses computers, networks, and the Internet to perpetrate crime.  
🗑
computer forensics   The application of computer systems and techniques to gather potential legal evidence; a law enforcement specialty used to fight high-tech crime.  
🗑
botnet   A large group of software applications (called robots or bots) that run without user intervention on a large number of computers.  
🗑
boot-sector virus   A virus that replicates itself into a master boot record of a flash drive or hard drive.  
🗑
black-hat hacker   A hacker who uses his or her knowledge to destroy information of for illegal gain.  
🗑
biometric authentication device   A device that uses some unique characteristics of human biology to identify authorized users.  
🗑
backup   A copy of a computer file that can be used to replace the original if it's lost or damaged.  
🗑
backdoor program   Program that enables a hacker to take complete control of a computer without a legitimate user's knowledge or permission.  
🗑
antivirus system   Software specially designed to detect viruses and protect a computer and files from harm.  
🗑
adware   A program that downloads on your computer, when a user installs a freeware program, game, or utility. Generally, adware enables sponsored advertisements to appear in a section of a browser window or as a pop-up ad.  
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: TroyIS2241
Popular Computers sets