1/44
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Human - Centered Design
The process that ensures that the designs match the needs and capabilities of the people for whom they are intended.
Ethics and Social Responsibility
Responsibility in promoting ethical and socially responsible technological solutions.
Technology as Applied Science
The misconception that all technology solely comes from the application of scientific principles. These technologies were made by accident or didn't have any prior theoretical descriptions (like physics/math) to help guide its development.
Technology as Hardware
They are extraneous imperfections which undermine the efficiency of the machine. Physical hardware alone is not sufficient for there to be technology.
Technology as Rules
A series of steps that accomplish some goal. As society develops, more and more aspects of social life become more systemized in terms of system of rules.
Technology as Systems
In the system approach to technology, the user is inside the technology as designers, owners, administrators, advertisers, and propagandists channel the technology in one direction rather than another, and workers, consumers, and citizens are themselves channeled in one direction or another.
Lessig's Pathetic Dot
A simple but powerful visual representation of forces that regulate human behavior, often depicted as a dot (representing an individual) influenced by four forces, that are, market, law, norms, and architecture.
Market
Any arrangement that allows buyers and sellers to exchange things.
Law
Government regulations that impose penalties or restrictions, and bans certain products or actions with the consequence of penalty.
Norms
Rules and expectations by which a society guides the behavior of its members.
Architecture
The physical or digital structures that shape behavior and focus on the built environment.
Design
Changing some part of the world from its current state to preferred state.
DARPA (The Defense Advanced Research Projects Agency)
Research and development wing of the United States Department of Defense. Initially focused on military technology, aimed to create a communication network that could survive a nuclear attack.
ARPANET
The precursor to the Internet, was created to allow multiple computers to communicate by sending small packets of data across a network (packet switching). DARPA created ARPANET.
TCP (Transmission Control) /IP (Internet) Protocols
A set of rules which allow multiple computers to communicate over a network.
Human Protocol
A set of rules/way that describes how humans shows interact.
Traceroute
A diagnostic tool used to trace the path that data travels between nodes. Typically used to identify network problems or inefficient routing practices.
Ping
This command checks if an IP address is reachable or not.
DNS (Domain Name Service)
This is a system that connects website names with their IP addresses.
CERN (The European Organization for Nuclear Research)
Known for its physics equipments and also provides data for online users.
PageRank
Algorithm developed by Google that ranks web pages based on the number of connections to that particular web page.
Dunbar's Number
The idea that a person can only have a limited number of close relationships, probably around 150.
Degrees of Connection
This is the number of direct relationships that separates two individuals.
Explicit Knowledge
Type of knowledge that is easily communicated and available to everyone.
Implicit Knowledge
Type of knowledge that a person cannot consciously recall or explain but that nevertheless affects the person's thinking or behavior.
Concatenation
Joins together two or more strings end-to-end to make a new string.
Casting
Converts one data type to another.
CIA triad: Protecting Confidentiality
Protecting authorized restrictions on information access and disclosure.
CIA triad: Protecting Integrity
Protecting against improper modification.
CIA triad: Protecting Availability
Protection that ensures timely access to all the information required.
DoS - Denial of Service
An attack on a computer resource that prevents it from performing its normal operations, usually by overwhelming it with large numbers of requests in an effort to monopolize its resources.
Non - repudiation (Proof)
It is an assurance that the sender of information is provided with proof of delivery and the receiver is provided with proof of the sender's identity.
Social Engineering
Techniques that trick a person into disclosing confidential information.
Phishing
Deceiving users to click on malicious links through emails, phone calls, or even messages.
Pretexting
A form of social engineering in which one individual lies to obtain confidential data about another individual
Baiting
Getting a target user to perform an action by offering something tempting.
Tailgating
When an unauthorized individual enters a restricted-access building by following an authorized user.
Dumpster Diving
The act of digging through trash receptacles to find information that can be useful in an attack.
Penetration Testing
Involves traversing vulnerabilities and traversing the network using special tools to see if there is a likelihood of attack or weakness to attack.
Multi - Factor Authentication (MFA)
A security process that requires multiple steps to log in to an account.
Trace Data
Footprints you leave behind that you cannot see.
Metadata
Data that provides information about other data.
Fingerprinting
A technique used to track individuals based on unique data points about their devices, browser settings, and online behaviors, much like how physical fingerprints identify individuals uniquely.
National Security Agency (NSA)
Responsible for surveillance, codebreaking, and national security.
Advanced Encryption Standard (AES)
A symmetric encryption standard used by the NSA to secure data.