Unit 10: CyberSecurity & Global Impact

studied byStudied by 5 people
0.0(0)
Get a hint
Hint

Open standards are...

1 / 35

36 Terms

1

Open standards are...

  • Publicly available

  • Produced collaboratively

  • Not dominated by any one interest group

  • Not for profit and available free of charge or at a small cost

  • Sufficiently detailed to allow interoperability between the developers that use them.

New cards
2

trust model

The type of trust relationship that can exist between individuals or entities.

New cards
3

Cybersecurity

Measures taken to protect a computer or computer system against unauthorized access or attack

New cards
4

cyber warfare

software attacks against countries' computer systems controlling defense and other strategic operations

New cards
5

DDoS Attack

Distributed Denial of Service Attack. Typically a virus installed on many computers (thousands) activate at the same time and flood a target with traffic to the point the server becomes overwhelmed.

New cards
6

Phishing Scam

Spoofed email and website in order to trick a person into providing private information

New cards
7

computer viruses

destroy stored data

New cards
8

Firewall

(computing) a security system consisting of a combination of hardware and software that limits the exposure of a computer or computer network to attack from crackers

New cards
9

Cryptography

The study and use of techniques for securing communication.

New cards
10

Symmetric Encryption

the same key is used to encode and decode

New cards
11

Public Key Encryption

uses two keys: a public key that everyone can have and a private key for only the recipient

New cards
12

Certificate Authorities

Used by many websites for encryption to protect files and information that is transmitted over the Internet. They issue certificates to verify the identity of a user or computer.

New cards
13

digital certificate

a notice that guarantees a user or a Web site is legitimate

New cards
14

Cloud Computing

A system in which all computer programs and data is stored on a central server owned by a company (e.g. Google) and accessed virtually

New cards
15

Creative Commons (CC) license

Specialized copyright license that allows free distribution of copyrighted work.

New cards
16

Commercial Access

online research outputs that are free of all restrictions on access (e.g. access tolls) and free of many restrictions on use (e.g. certain copyright and license restrictions).

New cards
17

peer-to-peer network

A type of network that connects two client computers directly together.

New cards
18

Authenticated access

any process by which a system verifies the identity of a user who wishes to access it

New cards
19

Anonymous access

Requires no username or password

New cards
20

Censorship (of digital info)

Controlling or denying access to and/or publication of particularly regulated content.

New cards
21

open source software

Program code made publicly available for free; it can be copied, distributed, or changed without the stringent copyright protections of proprietary software products.

New cards
22

Licensing of software

need to purchase/get permission to use

New cards
23

aggregation of information

The gathering and summarization of information collected in various ways such as geolocation, cookies, browsing history.

New cards
24

anonymity

the state of being unknown

New cards
25

Proxy Servers (proxies)

Software servers that handle all communications from or sent to the Internet

New cards
26

exploitation

Taking advantage of a weaker group

New cards
27

Curation of information

Gathering information pertaining to a specific topic.

New cards
28

target advertising

advertising to select group

New cards
29

intellectual property

A product of the intellect, such as an expressed idea or concept, that has commercial value.

New cards
30

Copyright

the exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same.

New cards
31

Digital Millennium Copyright Act

a 1998 US law intended to update copyright law for electronic commerce and electronic content providers. It criminalizes the circumvention of electronic and digital copyright protection systems.

New cards
32

wireless

a form of computer networking or other communication that uses radio signals and microwaves to transmit data

New cards
33

digital divide

The relative lack of access to the latest technologies among low-income groups, racial and ethnic minorities, rural residents, and the citizens of developing countries

New cards
34

socioeconomic status

an individual's position in a stratified social order

New cards
35

infrastructure

the basic framework of a building or a system

New cards
36

commercial

having to do with business or trade

New cards

Explore top notes

note Note
studied byStudied by 11 people
... ago
5.0(1)
note Note
studied byStudied by 21 people
... ago
5.0(2)
note Note
studied byStudied by 17 people
... ago
5.0(1)
note Note
studied byStudied by 78 people
... ago
5.0(1)
note Note
studied byStudied by 13 people
... ago
5.0(1)
note Note
studied byStudied by 6 people
... ago
5.0(1)
note Note
studied byStudied by 53 people
... ago
5.0(3)
note Note
studied byStudied by 37 people
... ago
5.0(2)

Explore top flashcards

flashcards Flashcard (20)
studied byStudied by 2 people
... ago
5.0(1)
flashcards Flashcard (60)
studied byStudied by 116 people
... ago
4.1(10)
flashcards Flashcard (42)
studied byStudied by 9 people
... ago
5.0(1)
flashcards Flashcard (52)
studied byStudied by 15 people
... ago
5.0(1)
flashcards Flashcard (20)
studied byStudied by 2 people
... ago
5.0(1)
flashcards Flashcard (50)
studied byStudied by 16 people
... ago
5.0(2)
flashcards Flashcard (27)
studied byStudied by 1 person
... ago
5.0(1)
flashcards Flashcard (45)
studied byStudied by 59 people
... ago
5.0(2)
robot