click below
click below
Normal Size Small Size show me how
ICT Ethics Terms
Leach ICT Ethics Terms
| Question | Answer |
|---|---|
| Plagiarism | stealing and passing off (the ideas or words of another) as one's own |
| Hacker | a person who illegally gains access to and sometimes tampers with information in a computer system |
| Firewall | computer hardware or software that prevents unauthorized access to private data (as on a company's local area network or intranet) by outside computer users (as of the Internet) |
| Phishing | a scam by which an e-mail user is duped into revealing personal or confidential information which the scammer can use illicitly |
| Copyright | the exclusive legal right to reproduce, publish, sell, or distribute the matter and form of something (as a literary, musical, or artistic work) |
| Piracy | the unauthorized use of another's production, invention, or conception especially in infringement of a copyright |
| Spoofing | a technique used to gain unauthorized access to computers, whereby the intruder sends messages to a computer with an IP address indicating that the message is coming from a trusted host. |
| Cybercrime | any criminal act dealing with computers and networks (called hacking). It also includes crimes conducted through the internet. |
| Encryption | the translation of data into a secret code. It is the most effective way to achieve data security |
| Computer forensics | the application of scientifically proven methods to gather, process, interpret, and use digital evidence to provide a description of cyber crime activities. |
| Spyware | a form of software that collects information about the user in order to display advertisements in the Web browser based on the information it collects from the user’s browsing patterns. |
| Virus | a computer program that is usually hidden within another seemingly harmless program and that produces copies of itself and inserts them into other programs and usually performs a malicious action (as destroying data) |
| Worm | a usually small self-contained and self-replicating computer program that invades computers on a network and usually performs a destructive action |
| Spam | unsolicited usually commercial e-mail sent to a large number of addresses |
| Public domain | is a range of abstract materials – commonly referred to as intellectual property – which are not owned or controlled by anyone. The term indicates that these materials are therefore "public property", and available for anyone to use for any purpose. |