Busy. Please wait.

show password
Forgot Password?

Don't have an account?  Sign up 

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
We do not share your email address with others. It is only used to allow you to reset your password. For details read our Privacy Policy and Terms of Service.

Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
Didn't know it?
click below
Knew it?
click below
Don't know (0)
Remaining cards (0)
Know (0)
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Ethics CT

Computer Tech Ethics

Criminal Hackers (Or Black Hats) professional hackers whose goal is to make money and/or harm the interests of others
Personal Data Collection Collecting information about people such as their name, address and phone number.
Cyber-Terrorist Hackers violent extremists who use hacking as a tool to further their terrorist purposes
Personal Identity Theft Stealing someone's information such as their social security number or credit card number
Nation-State Hackers known as cyber-spies, who hack bon behalf of the interests of their nation. Many countries, including the US, hire hackers to defend government networks and computers and/or to actively infiltrate other gov’ts networks and computers
Copyright A legal right granted to the creator, publisher or distributor of a work.
Ethical Hackers (or White Hats) who are often hired by companies as consultants to test system security
Piracy The unauthorized and illegal reproduction, sale, distribute or other use of copyrighted work.
Crackers who break into computers and networks illegally
Plagiarism The act of taking work written or created by someone else and using it as your own.
Hacker Gangs organized groups that hack each other, web sites, and companies
Hactivists those whose hacking goals are to further a social or political cause
Malware Software designed to infiltrate or damage a computer system, without the owner's consent and most commonly in the form of a virus, trojan, or spyware.
Spam An unsolicited e-mail sent via bulk e-mail.
Viruses A program that can replicate itself and spreads itself by means of a transferable host.
Spyware Malicious software that subverts the computer’s operation for the benefit of a third party.
Phishing An attempt to fraudulently acquire confidential information, such as passwords and credit card details, by masquerading as a trustworthy person or business in an apparently official electronic communication, such as an email or an instant message.
Pharming Software that allows a hacker to: acquire the domain name for a site and redirect that website’s traffic to another website for the purpose of gaining access to usernames, passwords, etc.
Trojans A malicious program that is disguised as a legitimate program.
Worms A self-replicating computer program that is self-contained and does not need to be part of another program to propagate itself.
Backdoors Method of remaining hidden on a computer while bypassing normal authentication and securing remote access to a computer.
Zombie Computers A computer attached to the Internet that is under remote direction by an illegitimate user.
Created by: misskline



Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!

"Know" box contains:
Time elapsed:
restart all cards