E-tech 2.0

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/13

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 5:58 AM on 10/8/23
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

14 Terms

1
New cards
Spoofing
When a fraud pretends to be someone or something else to win a person's trust but then steal data, steal money, or spread malware.
2
New cards
Computer bug
A malfunction on a computer system through its runtime.
3
New cards

Plagiarism

The fraudulent representation of another person's language, thoughts, ideas, or expressions as one's own original work.

4
New cards
Internet bot
A network of zombie computers that have been taken over by a robot that performs large-scale malicious acts for the creator.
5
New cards
Trojan Horse
A type of malware that typically gets hidden as an attachment in email or a free-to-download file, then transfers onto the user's device.
6
New cards
Rootkit
A collection of software designed to give malicious actors control of a computer network or application.
7
New cards
Copyright Infringement
The use of works protected by copyright without permission for usage where such is required, thereby infringing certain exclusive rights granted to the copyright holder.
8
New cards
Cyber bullying
The act of tormenting, threatening, harassing, or embarrassing another person using the internet or other technologies.
9
New cards
Cyber stalking
The use of internet and electronic devices to harass or stalk an individual, group, or organization.
10
New cards
Online safety
Refers to the practices and precautions that should be observed when using the internet to ensure that the user, as well as their computers and personal information, are safe from crimes associated with using the internet.
11
New cards
Keylogger
A computer program that records every keystroke made by a computer user, especially in order to gain fraudulent access to passwords and other confidential information.
12
New cards
Worm
A standalone malware computer program that replicates itself in order to spread to other computers.
13
New cards
Intellectual property
Property that includes intangible creations of the human intellect like patents, copyrights, trademarks, and trade secrets.
14
New cards
Phishing
An email disguised as coming from a legitimate, trustworthy source which aims to lure you into revealing sensitive or confidential information.