Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Computer Concepts

Ch. 09 Privacy, Security, and Ethics

QuestionAnswer
access who controls access to data
accuracy who is responsible to ensure data is correct
antispyware / spy removal program designed to detect and remove various types of privacy threats.
big data The ever-growing volume of data
biometric scanning such as fingerprint and iris (eye) scanners.
botnet / robot network A collection of zombie computers
browser cache / temporary Internet file contain website content and display instructions
computer crime / Cybercrime An illegal action involving special knowledge of computer technology.
computer ethics guidelines for the morally acceptable use of computers in our society. We are all entitled to ethical treatment.
Computer Fraud and Abuse Act makes spreading a virus a federal offense & helps protect against data manipulation
computer monitoring software the most invasive and dangerous type of spyware.
cookies small data files that are deposited on your hard disk from websites you have visited.
copyright a legal concept that gives content creators the right to control use and distribution of their work.
cracker / Malicious Program a computer criminal who creates and distributes malicious programs.
cyberbullying the use of the Internet, smartphones, or other devices to send or post content intended to hurt or embarrass another person.
data security concerned with protecting software and data from unauthorized tampering or damage.
denial of service (DoS) attack An attack that occurs when legitimate users are denied access to a computer system because a hacker is repeatedly making requests of that computer system that tie up its resources and deny legitimate users access.
dictionary attack uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user’s account.
Digital Millennium Copyright Act establishes the right of a program owner to make a backup copy of any program and disallows the creation of copies to be sold or given away. It is also illegal to download copyright-protected music and videos from the Internet.
digital rights management (DRM) is a collection of technologies designed to prevent copyright violations. Typically, DRM is used to (1) control the number of devices that can access a given file and (2) limit the kinds of devices that can access a file
disaster recovery plan describing ways to continue operating until normal computer operations can be restored.
electronic profile compiled from databases to provide highly detailed and personalized descriptions of individuals
employee-monitoring software Many organizations monitor employee e-mail and computer files using special software
encryption the process of coding information to make it unreadable except to those who have a special piece of information known as an encryption key
encryption key / key a special piece of information
ethics standards of moral conduct.
Family Educational Rights and Privacy Act (FERPA) restricts disclosure of educational records.
firewall / security suites / password managers A software program or hardware device designed to prevent unauthorized access to computers or networks.
first-party cookie is one that is generated (and then read) only by the website you are currently visiting.
Freedom of Information Act entitles individuals access to governmental records relating to them
Gramm-Leach-Bliley Act protects personal financial information
hacker Someone who gains unauthorized access to computers that contain information about us is commonly
Health Insurance Portability and Accountability Act (HIPAA) protects medical records
history file record sites visited
(hypertext transfer protocol secure) requires browsers and websites to encrypt all messages
identity theft the illegal assumption of someone’s identity for the purposes of economic gain.
illusion of anonymity Many people believe that, while using the web, little can be done to invade their privacy.
Incognito Mode privacy mode. Google Chrome provides Incognito Mode accessible from the Chrome menu
information broker(reseller) collect and sell personal data.
Internet scam a scam using the Internet.
IT security analyst responsible for maintaining the security of a company’s network, systems, and data. Employers look for candidates with a bachelor’s or associate’s degree in information systems or computer science and network experience.
keystroke logger one type of computer monitoring software
malware (malicious software) include viruses, worms, and Trojan horses.
mistaken identity an electronic profile of one person is switched with another.
online identity the information that people voluntarily post about themselves online. With the popularity of social networking, blogging, and photo- and video-sharing sites, many people post intimate details of their lives without considering the consequences.
password secret words or phrases (including numbers, letters, and special characters) that must be keyed into a computer system to gain access.
phishing attempts to trick Internet users into thinking a fake but official-looking website or e-mail is legitimate.
physical security concerned with protecting hardware from possible human and natural disasters. Data security is concerned with protecting software and data from unauthorized tampering or damage.
plagiarism representing some other person’s work and ideas as your own without giving credit to the original source.
privacy concerns the collection and use of data about individuals.
privacy mode ensures that your browsing activity is not recorded on your hard disk.
Private Browsing privacy mode. Safari provides Private Browsing accessible from the Safari option on the main menu.
property who owns data
rogue Wi-Fi hotspot imitate legitimate hotspots to capture personal information.
scam a fraudulent or deceptive act or operation designed to trick individuals into providing personal information or spending their time and money for little or no return.
security involves protecting individuals and organizations from theft and danger.
software piracy he unauthorized copying and distribution of software.
spyware secretly records and reports Internet activities.
third-party cookie / tracking cookies usually generated by an advertising company that is affiliated with the website you are currently visiting. These cookies are used by the advertising company to keep track of your web activity as you move from one site to the next.
Trojan horse programs that appear to be harmless; however, they contain malicious programs.
virtual private network (VPN) encrypt connections between company networks and remote users such as workers connecting from home. This connection creates a secure virtual connection to a company LAN across the Internet.
virus programs that migrate through networks and operating systems, and most attach themselves to different programs and databases.
web bugs invisible images or HTML code hidden within a web page or e-mail message, can be used to transmit information without your knowledge
wireless network encryption Restricts access to authorized users on wireless networks.
worm programs that simply replicate themselves over and over again. Once active in a network, the self-replicating activity clogs computers and networks until their operations are slowed or stopped
WPA2 (Wi-Fi Protected Access 2) the most widely used wireless network encryption for home wireless networks. It is typically established for a wireless network through the network’s wireless router.
zombie remotely controlled infected computers used for malicious purposes.
whole-house surge protector A surge protector that's installed on (or near) the breaker panel of a home and that protects all electronic devices in the home from power surges.
white-hat hacker (ethical hacker) A hacker who breaks into system just for the challenge of it(who doesn't wish to steal or wreck havoc on the system). Such hackers tout themselves as experts who are performing a service for society by helping company realize the vulnerabilities in system
virus signature A portion of the virus code that's unique to a particular computer virus and that makes it identifiable by antivirus software.
time bomb A virus that's triggered by the passage of time or on a certain date.
surge protector A device that protects computers and other electronic devices from power surges.
stealth virus A virus that temporarily erases its code from the files where it resides and hides in the active memory of the computer.
spear phishing A targeted phishing attack that sends e-mails to people known to be customers of a company. Such attacks have a much greater chance of successfully getting individuals to reveal sensitive data.
spam filter An option you can select in your e-mail account that places known or suspected spam messages into a folder other than your inbox.
spam Unwanted or junk e-mail.
social engineering Any technique that uses social skills to generate human interaction for the purpose of enticing individuals to reveal sensitive information.
script A list of commands (mini-programs or macros) that can be executed on a computer without user interaction.
scareware A type of malware that's downloaded onto your computer and that tries to convince you that your computer is infected with a virus or other type of malware.
rootkit Programs that allow hacker to gain access to the computer and take almost complete control of it without your knowledge. These programs are designed to subvert normal login procedure to a computer and to hide their operations from normal detection methods
quarantining The placement (by antivirus) of a computer virus in a secure area on the hard drive so that it won't spread infection to other files.
program files Files that are used in the running of software programs and that do not store data.
pretexting The act of creating an invented scenario (the pretext) to convince someone to divulge information.
polymorphic virus A virus that changes its virus signature (the binary pattern that makes the virus identifiable) every time it infects a new file. This makes it more difficult for antivirus programs to detect the virus.
pharming Planting malicious code on a computer that alerts the browser's ability to find web address and that directs users to bogus website.
personal firewall A firewall specifically designed for home networks.
packet filtering Firewalls can be configured so that they filter out packets sent to specific logical ports in a process.
packet analyzer (sniffer) A computer hardware device or software program designed to detect and record digital information being transmitted over a network.
network address translation (NAT) A process that firewalls use to assign internal Internet protocol addresses on a network.
multipartite virus Literally meaning "multipart" virus; a type of computer virus that attempts to infect computers using more than one method.
master boot record A small program that runs whenever a computer boots up.
malware Software that's intended to render a system temporarily or permanently useless or to penetrate a computer system completely for purposes of information gathering. Examples include spyware, viruses, worms, and Trojan horses.
macro virus A virus that's distributed by hiding it inside a macro.
logic bomb A computer virus that runs when a certain set of conditions is met, such as when a program launched a specific number of times.
logical port blocking A condition in which a firewall is configured to ignore all incoming packets that request access to a certain port so that no unwanted requests will get through to the computer.
logical port A viral communications gateway or path that enables a computer to organize requests for information (such as web page downloads and e-mail routing) from other networks or computers.
keystroke logger (keylogger) A type of spyware program that monitors keystrokes with the intent of stealing passwords, login IDs, or credit card information.
inoculation A process used by antivirus software; compares old and current qualities of files to detect viral activity.
incremental backup (partial backup) A type of backup that only backs up files that have changed since the last time files were backed up.
image backup (system backup) A copy of an entire computer system, created for restoration purpose.
identify theft The process by which someone uses personal information about someone else (such as the victim's name, address, and Social Security number) to assume the victim's identity for the purpose of defrauding another.
grey-hat hacker A cross between black and white - a hacker who will often illegally break into systems merely to flaunt his or her expertise to the administrator of the system he or she penetrated or to attempt to sell his or her services in repairing security branches.
geotag Data attached to a photograph that indicates the latitude and longitude where you were standing when you took the photo.
encryption virus A malicious program that searches for common data files and compress them into a file using a complex encryption key, thereby rendering the files unusable.
e-mail virus A virus transmitted by e-mail that often uses the address book in the victim's e-mail system to distribute itself.
drive-by download The use of malicious software to attack a computer by downloading harmful programs onto a computer, without the user's knowledge, while they are surfing a website.
Distributed denial-of-service (DDOS) attack An automated attack that's launched from more than one zombie computer at the same time.
data file A file that contains stored data.
data breach When sensitive or confidential information is copied, transmitted, or viewed by an individual who is not authorized to handle the data.
cyberloafing Doing anything with a computer that's unrelated to a job (such as playing video games) while one's supposed to be working. Also called cyberslacking.
cybercriminal An individual who uses computers, networks, and the Internet to perpetrate crime.
computer forensics The application of computer systems and techniques to gather potential legal evidence; a law enforcement specialty used to fight high-tech crime.
botnet A large group of software applications (called robots or bots) that run without user intervention on a large number of computers.
boot-sector virus A virus that replicates itself into a master boot record of a flash drive or hard drive.
black-hat hacker A hacker who uses his or her knowledge to destroy information of for illegal gain.
biometric authentication device A device that uses some unique characteristics of human biology to identify authorized users.
backup A copy of a computer file that can be used to replace the original if it's lost or damaged.
backdoor program Program that enables a hacker to take complete control of a computer without a legitimate user's knowledge or permission.
antivirus system Software specially designed to detect viruses and protect a computer and files from harm.
adware A program that downloads on your computer, when a user installs a freeware program, game, or utility. Generally, adware enables sponsored advertisements to appear in a section of a browser window or as a pop-up ad.
Created by: TroyIS2241
Popular Computers sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards