Module 9 - Privacy and Ethics

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/31

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

32 Terms

1
New cards

most significant concerns

privacy, security, ethics

2
New cards

privacy

privacy, accuracy, property, access

3
New cards

information resellers/brokers

collect and sell personal data, create electronic profiles ex) credit card info

4
New cards

issues with large databases

collecting personal info, spreading info without consent leading to identity theft, spreading misinfo

5
New cards

Freedom of Information Act

entitlement to look at your records held by government agencies

6
New cards

private networks

employee monitoring software, employers can legally monitor email

7
New cards

info is stored on hard drive in

history files, temporary internet files or browser cache, cookies

8
New cards

history files

Include locations or addresses of sites you have recently visited

9
New cards

temporary internet files or browser cache

Saved files from visited websites,
Performance improvement when you return to already visited sites

10
New cards

cookies

Small data files that are deposited on your hard disk from websites you have visited

11
New cards

first-party cookies

generated only by websites you are visiting

12
New cards

third-party cookies

generated by an advertising company that is affiliated with the website

13
New cards

web bugs or web beacon

Invisible, single-pixel images or HTML code hidden within a web page or e-mail message

14
New cards

spyware

record and report internet activities, change browser to manipulate what you view

15
New cards

computer monitoring software

most invasive ans dangerous, keystroke loggers record activities and keystrokes

16
New cards

data manipulation

unauthorized access of a computer network and copying files to or from server

17
New cards

denial of service

attempts to slow or stop computer system by flooding with requests for info and data

18
New cards

distributed denial of service

coordinates several computers making repeated requests for service

19
New cards

phishing

pretending to be official organization, tricks users to gain personal info

20
New cards

social engineering

practice of manipulating people to get private data

21
New cards

malicious software or malware

designed by crackers to damamge or disrupt a computer system - viruses, worms, trojan horse

22
New cards

viruses

migrate through networks and attach to different programs

23
New cards

worms

fills computer with self replicating info

24
New cards

trojan horse

programs disguised as something else

25
New cards

malicious hardware

criminals use hardware for crimes - zombies, rouge wifi hitspots, infecting USB flash drives

26
New cards

Botnet or robot network

collection of zombies, computers infected by virus, worm or trojan horse

27
New cards

measures to ensure computer security

restricting access, encrypting data, anticipating disasters, preventing data loss

28
New cards

dictionary attack

uses software to try thousands of common words sequentially in an attempt to gain unauthorized access

29
New cards

biometric scanning

fingerprint scanners, eye scanners, facial recognition

30
New cards

security tasks

security suites, firewalls, password managers, authentication

31
New cards

encryption

coding info to make it unreadable except to those who have key ex) https, vpns, WPA2

32
New cards

software piracy

unauthorized copying and distribution of software