Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Dig.CitizenshipVocab

codeHS - Digital Citizenship and Cyber Hygiene Unit

TermDefinition
Cybersecurity Protection of computer systems, networks, and data from digital attacks
Cybercrime Identity theft, stealing money, stealing private information, controlling private computers
Malware Viruses, worms, trojans, spyware, adware, ransomware, rootkits
Internet of Things A network of physical devices, vehicles, home, appliances, and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these things to connect and exchange data
Personal Identifiable Info Information that can be used to identify, locate, or contact an individual. This includes, names, addresses, phone numbers, social security numbers, birthdays, account numbers, passwords, family and pet names, email, school name and location, pictures
Protected Health Information (PHI) Medical info obtained from medical visits that can be used to locate or contact an individual
Passwords The first line of defense against web attacks
Strong Passwords 8 characters long, have upper and lower case letters, numbers and a special character, should not include any PII
Password Manager Helps organize and possibly creates passwords for you internet accounts and stores them
Passphrase A phrase that you type in instead of a word that uses the first letters of each word, adding name of website, and then substituting in numbers and specials characters
Secure Website URL (website address) has in front of it and will usually have a lock as well
Virus Requires an active host program or an already infected and active operating system
Trojans Disguises itself as a normal file or program to trick users into downloading and installing malware
Rootkit Designed to remotely access or control a computer without being detected
Worms Stand-alone malicious programs that multiple via computer networks, overpowering the network causing it to crash
Spyware Functions by spying on user activity whiteout their knowledge. Captures your keystrokes so it knows what
Ransomware Software that encrypts programs and data until a ransom is paid to remove it. May also threaten to publish the victim's data or block access to it unless a ransom is paid
Adware Displays unwanted ads or pop-ups on the screen
Phishing Scams that try to trick you into providing private information like password, account number, etc
CIA Triad Confidentiality, Integrity, Availability and should be guaranteed in every secure system.
Confidentiality Protection of information from people who are not authorized to view it.
Valuable Information Financial info, health records, gov't docs, some forms of PII
Integrity Aims at insuring info is protected from unauthorized or unintentional alteration (being tampered with)
Availability The assurance that systems and data are accessible by authorized users when and where needed
Digital Footprint All of the information about a person that can be found online
Cyberbullying The use of electronic communication to bully a person includes sending, posting, and/or sharing negative, false, harmful, or mean content about someone else
Impacts of Cyberbullying Hurts real people and they may experience isolation, low-self esteem, poor school performance ,depression, and suicide.
Cyberbullying Characteristics Persistent, permanent, and discreet
Bystanders People that are aware of cyberbullying but don't intervene (could be that they don't want to become a victim as well)
Upstanders People who try to break the cycle of the cyberbullying, they will try to intervene
Cyberbullying Victim Checklist: 1. Don't respond to communication 2. Keep a record (screenshots) 3. Reach out - let parents, school staff know 4. Block communication with the bully/bullies 5. Report to online website admins 6. Don't retaliate 7. Don't forward 8. Don't believe the bully
Rude Comment Not intended to hurt or cause harm; harm was unintentional
Mean Comment Intentionally said to hurt or cause harm.
Created by: TheMsAllsop
Popular Computers sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards