click below
click below
Normal Size Small Size show me how
ICT Ethics Terms
Leach ICT Ethics Terms
Question | Answer |
---|---|
Plagiarism | stealing and passing off (the ideas or words of another) as one's own |
Hacker | a person who illegally gains access to and sometimes tampers with information in a computer system |
Firewall | computer hardware or software that prevents unauthorized access to private data (as on a company's local area network or intranet) by outside computer users (as of the Internet) |
Phishing | a scam by which an e-mail user is duped into revealing personal or confidential information which the scammer can use illicitly |
Copyright | the exclusive legal right to reproduce, publish, sell, or distribute the matter and form of something (as a literary, musical, or artistic work) |
Piracy | the unauthorized use of another's production, invention, or conception especially in infringement of a copyright |
Spoofing | a technique used to gain unauthorized access to computers, whereby the intruder sends messages to a computer with an IP address indicating that the message is coming from a trusted host. |
Cybercrime | any criminal act dealing with computers and networks (called hacking). It also includes crimes conducted through the internet. |
Encryption | the translation of data into a secret code. It is the most effective way to achieve data security |
Computer forensics | the application of scientifically proven methods to gather, process, interpret, and use digital evidence to provide a description of cyber crime activities. |
Spyware | a form of software that collects information about the user in order to display advertisements in the Web browser based on the information it collects from the user’s browsing patterns. |
Virus | a computer program that is usually hidden within another seemingly harmless program and that produces copies of itself and inserts them into other programs and usually performs a malicious action (as destroying data) |
Worm | a usually small self-contained and self-replicating computer program that invades computers on a network and usually performs a destructive action |
Spam | unsolicited usually commercial e-mail sent to a large number of addresses |
Public domain | is a range of abstract materials – commonly referred to as intellectual property – which are not owned or controlled by anyone. The term indicates that these materials are therefore "public property", and available for anyone to use for any purpose. |