Not for profit and available free of charge or at a small cost
Sufficiently detailed to allow interoperability between the developers that use them.
New cards
2
trust model
The type of trust relationship that can exist between individuals or entities.
New cards
3
Cybersecurity
Measures taken to protect a computer or computer system against unauthorized access or attack
New cards
4
cyber warfare
software attacks against countries' computer systems controlling defense and other strategic operations
New cards
5
DDoS Attack
Distributed Denial of Service Attack. Typically a virus installed on many computers (thousands) activate at the same time and flood a target with traffic to the point the server becomes overwhelmed.
New cards
6
Phishing Scam
Spoofed email and website in order to trick a person into providing private information
New cards
7
computer viruses
destroy stored data
New cards
8
Firewall
(computing) a security system consisting of a combination of hardware and software that limits the exposure of a computer or computer network to attack from crackers
New cards
9
Cryptography
The study and use of techniques for securing communication.
New cards
10
Symmetric Encryption
the same key is used to encode and decode
New cards
11
Public Key Encryption
uses two keys: a public key that everyone can have and a private key for only the recipient
New cards
12
Certificate Authorities
Used by many websites for encryption to protect files and information that is transmitted over the Internet. They issue certificates to verify the identity of a user or computer.
New cards
13
digital certificate
a notice that guarantees a user or a Web site is legitimate
New cards
14
Cloud Computing
A system in which all computer programs and data is stored on a central server owned by a company (e.g. Google) and accessed virtually
New cards
15
Creative Commons (CC) license
Specialized copyright license that allows free distribution of copyrighted work.
New cards
16
Commercial Access
online research outputs that are free of all restrictions on access (e.g. access tolls) and free of many restrictions on use (e.g. certain copyright and license restrictions).
New cards
17
peer-to-peer network
A type of network that connects two client computers directly together.
New cards
18
Authenticated access
any process by which a system verifies the identity of a user who wishes to access it
New cards
19
Anonymous access
Requires no username or password
New cards
20
Censorship (of digital info)
Controlling or denying access to and/or publication of particularly regulated content.
New cards
21
open source software
Program code made publicly available for free; it can be copied, distributed, or changed without the stringent copyright protections of proprietary software products.
New cards
22
Licensing of software
need to purchase/get permission to use
New cards
23
aggregation of information
The gathering and summarization of information collected in various ways such as geolocation, cookies, browsing history.
New cards
24
anonymity
the state of being unknown
New cards
25
Proxy Servers (proxies)
Software servers that handle all communications from or sent to the Internet
New cards
26
exploitation
Taking advantage of a weaker group
New cards
27
Curation of information
Gathering information pertaining to a specific topic.
New cards
28
target advertising
advertising to select group
New cards
29
intellectual property
A product of the intellect, such as an expressed idea or concept, that has commercial value.
New cards
30
Copyright
the exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same.
New cards
31
Digital Millennium Copyright Act
a 1998 US law intended to update copyright law for electronic commerce and electronic content providers. It criminalizes the circumvention of electronic and digital copyright protection systems.
New cards
32
wireless
a form of computer networking or other communication that uses radio signals and microwaves to transmit data
New cards
33
digital divide
The relative lack of access to the latest technologies among low-income groups, racial and ethnic minorities, rural residents, and the citizens of developing countries
New cards
34
socioeconomic status
an individual's position in a stratified social order