1/31
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
most significant concerns
privacy, security, ethics
privacy
privacy, accuracy, property, access
information resellers/brokers
collect and sell personal data, create electronic profiles ex) credit card info
issues with large databases
collecting personal info, spreading info without consent leading to identity theft, spreading misinfo
Freedom of Information Act
entitlement to look at your records held by government agencies
private networks
employee monitoring software, employers can legally monitor email
info is stored on hard drive in
history files, temporary internet files or browser cache, cookies
history files
Include locations or addresses of sites you have recently visited
temporary internet files or browser cache
Saved files from visited websites,
Performance improvement when you return to already visited sites
cookies
Small data files that are deposited on your hard disk from websites you have visited
first-party cookies
generated only by websites you are visiting
third-party cookies
generated by an advertising company that is affiliated with the website
web bugs or web beacon
Invisible, single-pixel images or HTML code hidden within a web page or e-mail message
spyware
record and report internet activities, change browser to manipulate what you view
computer monitoring software
most invasive ans dangerous, keystroke loggers record activities and keystrokes
data manipulation
unauthorized access of a computer network and copying files to or from server
denial of service
attempts to slow or stop computer system by flooding with requests for info and data
distributed denial of service
coordinates several computers making repeated requests for service
phishing
pretending to be official organization, tricks users to gain personal info
social engineering
practice of manipulating people to get private data
malicious software or malware
designed by crackers to damamge or disrupt a computer system - viruses, worms, trojan horse
viruses
migrate through networks and attach to different programs
worms
fills computer with self replicating info
trojan horse
programs disguised as something else
malicious hardware
criminals use hardware for crimes - zombies, rouge wifi hitspots, infecting USB flash drives
Botnet or robot network
collection of zombies, computers infected by virus, worm or trojan horse
measures to ensure computer security
restricting access, encrypting data, anticipating disasters, preventing data loss
dictionary attack
uses software to try thousands of common words sequentially in an attempt to gain unauthorized access
biometric scanning
fingerprint scanners, eye scanners, facial recognition
security tasks
security suites, firewalls, password managers, authentication
encryption
coding info to make it unreadable except to those who have key ex) https, vpns, WPA2
software piracy
unauthorized copying and distribution of software