click below
click below
Normal Size Small Size show me how
Unit 3 CSP Vocab
| Term | Definition |
|---|---|
| Computer Virus | Malicious code that spreads by attaching itself to clean files or programs. |
| Cybersecurity | Practices and technologies used to protect networks, computers, and data from attacks or unauthorized access. |
| Keylogging | A type of spyware that secretly records every key a user presses. |
| Malware | Any harmful software (viruses, worms, spyware, ransomware, etc.) designed to damage or steal data. |
| Personally identifiable information | Any data that can identify a person (name, address, SSN, birthdate). |
| Phishing | A scam where attackers trick people into giving personal information (passwords, credit cards) using fake emails or websites. |
| Targeted marketing | Ads aimed at specific people based on collected data (search history, demographics, behaviors). |
| Debugging | Finding and fixing errors in code. |
| DDoS (Distributed Denial of Service) | An attack where many devices flood a server with traffic to overload it and shut it down. |
| Rogue Access Point | A fake Wi-Fi network set up by attackers to steal data from people who connect to it. |
| Syntax Error | A mistake in the code’s grammar (misspelled keywords, missing parentheses) that prevents the program from running. |
| Logic Error | The program runs but produces the wrong output because the algorithm or reasoning is incorrect. |
| Run Time Error | An error that occurs while the program is running (like dividing by zero). |
| Index Out of Bounds | Trying to access a list/array position that doesn’t exist. |
| Rounding Error | Small inaccuracy that happens when decimal numbers are approximated by computers. |
| Privacy | The right to control your personal data and how it’s used. |
| Security | Protecting systems and data from unauthorized access, attacks, or damage. |