* Publicly available * Produced collaboratively * Not dominated by any one interest group * Not for profit and available free of charge or at a small cost * Sufficiently detailed to allow interoperability between the developers that use them.
2
New cards
trust model
The type of trust relationship that can exist between individuals or entities.
3
New cards
Cybersecurity
Measures taken to protect a computer or computer system against unauthorized access or attack
4
New cards
cyber warfare
software attacks against countries' computer systems controlling defense and other strategic operations
5
New cards
DDoS Attack
Distributed Denial of Service Attack. Typically a virus installed on many computers (thousands) activate at the same time and flood a target with traffic to the point the server becomes overwhelmed.
6
New cards
Phishing Scam
Spoofed email and website in order to trick a person into providing private information
7
New cards
computer viruses
destroy stored data
8
New cards
Firewall
(computing) a security system consisting of a combination of hardware and software that limits the exposure of a computer or computer network to attack from crackers
9
New cards
Cryptography
The study and use of techniques for securing communication.
10
New cards
Symmetric Encryption
the same key is used to encode and decode
11
New cards
Public Key Encryption
uses two keys: a public key that everyone can have and a private key for only the recipient
12
New cards
Certificate Authorities
Used by many websites for encryption to protect files and information that is transmitted over the Internet. They issue certificates to verify the identity of a user or computer.
13
New cards
digital certificate
a notice that guarantees a user or a Web site is legitimate
14
New cards
Cloud Computing
A system in which all computer programs and data is stored on a central server owned by a company (e.g. Google) and accessed virtually
15
New cards
Creative Commons (CC) license
Specialized copyright license that allows free distribution of copyrighted work.
16
New cards
Commercial Access
online research outputs that are free of all restrictions on access (e.g. access tolls) and free of many restrictions on use (e.g. certain copyright and license restrictions).
17
New cards
peer-to-peer network
A type of network that connects two client computers directly together.
18
New cards
Authenticated access
any process by which a system verifies the identity of a user who wishes to access it
19
New cards
Anonymous access
Requires no username or password
20
New cards
Censorship (of digital info)
Controlling or denying access to and/or publication of particularly regulated content.
21
New cards
open source software
Program code made publicly available for free; it can be copied, distributed, or changed without the stringent copyright protections of proprietary software products.
22
New cards
Licensing of software
need to purchase/get permission to use
23
New cards
aggregation of information
The gathering and summarization of information collected in various ways such as geolocation, cookies, browsing history.
24
New cards
anonymity
the state of being unknown
25
New cards
Proxy Servers (proxies)
Software servers that handle all communications from or sent to the Internet
26
New cards
exploitation
Taking advantage of a weaker group
27
New cards
Curation of information
Gathering information pertaining to a specific topic.
28
New cards
target advertising
advertising to select group
29
New cards
intellectual property
A product of the intellect, such as an expressed idea or concept, that has commercial value.
30
New cards
Copyright
the exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same.
31
New cards
Digital Millennium Copyright Act
a 1998 US law intended to update copyright law for electronic commerce and electronic content providers. It criminalizes the circumvention of electronic and digital copyright protection systems.
32
New cards
wireless
a form of computer networking or other communication that uses radio signals and microwaves to transmit data
33
New cards
digital divide
The relative lack of access to the latest technologies among low-income groups, racial and ethnic minorities, rural residents, and the citizens of developing countries
34
New cards
socioeconomic status
an individual's position in a stratified social order