Save
Busy. Please wait.
or

show password
Forgot Password?

Don't have an account?  Sign up 
or

Username is available taken
show password

why


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
We do not share your email address with others. It is only used to allow you to reset your password. For details read our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't know (0)
Remaining cards (0)
Know (0)
0:00
share
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

DL-Unit 4

Computer Security & Privacy

TermDefinition
Cyber Safety Rules and guidelines for safety and security when using the Internet
Cyber Ethics A broad philosophical concept that goes beyond simple right and wrong and looks towards creating safe and healthy online environments
Cyber Security The body of technologies, processes, and practices designed to protect networks, computers, programs, and data from attack, damage, or unauthorized access
Back-up To make a copy of files in case of a computer problem
Active Content A small program that gets installed on a computer while browsing the Internet; provides an interactive Internet experience through videos and toolbars; used to gain unauthorized access to a computer then damage data stored or install malicious software
Computer Crimes Computer-based activities that violate the law
Computer Fraud The unauthorized use of computer data for personal gain
Computer Privacy Keeping your personal files and data secret and secure from unauthorized viewing or tampering
Computer Security The protection of a computer system and its data from accidental or intentional loss and tampering
Cookie A short line of text that a website puts on your computer's hard drive when you access the website
Copyright An exclusive right granted by the federal government allowing the owner to reproduce and sell an artistic or published work
Cyberbullying Bullying through Internet applications and technologies such as instant messaging (IM), social networking sites, and cell phones
Decryption A process that reverses encryption, taking a secret message and reproducing the original plain text
Encryption Process of converting readable data into unreadable characters to prevent unauthorized access
Firewall Part of a computer system that is designed to block unauthorized access
Hacker A person who uses computers to gain unauthorized access to data
Hoax An act intended to trick or deceive, a fraud
Intellectual Property A work or invention that is the result of creativity, such as a manuscript or a design, to which one has rights and for which one may apply for a patent, copyright, trademark, etc.
Internet Service Provider (ISP) Provides you with access to the Internet
Libel A published false statement that is damaging to a person's reputation; a written defamation
Logic Bomb Computer virus triggered by the appearance or disappearance of specific data
Online Predator Someone who deliberately uses the internet or digital media to develop inappropriate relationships
Password A safeguard for access to a computer or computer program
Phishing An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information
Plagiarism Taking credit for someone else's writing or ideas
Power Surge A sudden increase in electrical energy affecting the current that flows to electrical outlets
Secure Sockets Layer (SSL) A protocol developed by Netscape for securely transmitting documents over the Internet that uses a private key to encrypt data
Slander False charges and malicious oral statements about someone
Software Piracy Unauthorized copying or distribution of copyrighted software
Sexting The act of sending inappropriate sexual material, usually text or images, between cell phones
Spam Unwanted e-mail (usually of a commercial nature sent out in bulk)
Spyware A type of malware that locates and saves data from users without them knowing about it
Time Bomb Computer virus that does not cause its damage until a certain date or until the system has been booted a certain number of times
Trojan Horse A program that appears desirable but actually contains something harmful
Username A name you make up so that you can see or do things on a website, sometimes called screen name
Virus A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
Web Browser Allows users to access the World Wide Web
Web Address The address of a web page on the World Wide Web; also called a URL
Web Page A document which can display text, graphics, audio, video, and other elements through a web browser
Website A collection of related webpages
Worm A destructive computer virus that bores its way through a computer's files or through a computer's network
Created by: mmabe
 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!

"Know" box contains:
Time elapsed:
Retries:
restart all cards