click below
click below
Normal Size Small Size show me how
DL-Unit 4
Computer Security & Privacy
| Term | Definition |
|---|---|
| Cyber Safety | Rules and guidelines for safety and security when using the Internet |
| Cyber Ethics | A broad philosophical concept that goes beyond simple right and wrong and looks towards creating safe and healthy online environments |
| Cyber Security | The body of technologies, processes, and practices designed to protect networks, computers, programs, and data from attack, damage, or unauthorized access |
| Back-up | To make a copy of files in case of a computer problem |
| Active Content | A small program that gets installed on a computer while browsing the Internet; provides an interactive Internet experience through videos and toolbars; used to gain unauthorized access to a computer then damage data stored or install malicious software |
| Computer Crimes | Computer-based activities that violate the law |
| Computer Fraud | The unauthorized use of computer data for personal gain |
| Computer Privacy | Keeping your personal files and data secret and secure from unauthorized viewing or tampering |
| Computer Security | The protection of a computer system and its data from accidental or intentional loss and tampering |
| Cookie | A short line of text that a website puts on your computer's hard drive when you access the website |
| Copyright | An exclusive right granted by the federal government allowing the owner to reproduce and sell an artistic or published work |
| Cyberbullying | Bullying through Internet applications and technologies such as instant messaging (IM), social networking sites, and cell phones |
| Decryption | A process that reverses encryption, taking a secret message and reproducing the original plain text |
| Encryption | Process of converting readable data into unreadable characters to prevent unauthorized access |
| Firewall | Part of a computer system that is designed to block unauthorized access |
| Hacker | A person who uses computers to gain unauthorized access to data |
| Hoax | An act intended to trick or deceive, a fraud |
| Intellectual Property | A work or invention that is the result of creativity, such as a manuscript or a design, to which one has rights and for which one may apply for a patent, copyright, trademark, etc. |
| Internet Service Provider (ISP) | Provides you with access to the Internet |
| Libel | A published false statement that is damaging to a person's reputation; a written defamation |
| Logic Bomb | Computer virus triggered by the appearance or disappearance of specific data |
| Online Predator | Someone who deliberately uses the internet or digital media to develop inappropriate relationships |
| Password | A safeguard for access to a computer or computer program |
| Phishing | An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information |
| Plagiarism | Taking credit for someone else's writing or ideas |
| Power Surge | A sudden increase in electrical energy affecting the current that flows to electrical outlets |
| Secure Sockets Layer (SSL) | A protocol developed by Netscape for securely transmitting documents over the Internet that uses a private key to encrypt data |
| Slander | False charges and malicious oral statements about someone |
| Software Piracy | Unauthorized copying or distribution of copyrighted software |
| Sexting | The act of sending inappropriate sexual material, usually text or images, between cell phones |
| Spam | Unwanted e-mail (usually of a commercial nature sent out in bulk) |
| Spyware | A type of malware that locates and saves data from users without them knowing about it |
| Time Bomb | Computer virus that does not cause its damage until a certain date or until the system has been booted a certain number of times |
| Trojan Horse | A program that appears desirable but actually contains something harmful |
| Username | A name you make up so that you can see or do things on a website, sometimes called screen name |
| Virus | A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data |
| Web Browser | Allows users to access the World Wide Web |
| Web Address | The address of a web page on the World Wide Web; also called a URL |
| Web Page | A document which can display text, graphics, audio, video, and other elements through a web browser |
| Website | A collection of related webpages |
| Worm | A destructive computer virus that bores its way through a computer's files or through a computer's network |