1/18
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
risk
any possibility that something might occur resulting in an injury or a loss.
digital security risk
any event or action that could cause a loss of or damage to computer or mobile device hardware, software, data, information, or processing capability.
Types of digital security risks include threats to our
information, physical health, mental health,
and the environment.
Cybersecurity
the practice of protection against digital threats, including unauthorized or illegal access to data.
digital detox
a period of time during which an individual refrains from using
technology.
Threat actor
the technical term used to describe individuals who launch attacks against other users and their computers. They may also be called attackers.
dark web
a part of the web that is accessed using specialized software, where users and website operators can remain anonymous while performing illegal actions
Script kiddies
individuals who want to attack computers but lack the knowledge of computers and networks
hacker
a person who intends to access a computer system without permission
cracker
someone who accesses a computer or network illegally but has the intent of destroying data, stealing information, or other malicious action.
Hacktivists
attackers who are strongly motivated by principles or beliefs
Cyberterrorists
attack a nation’s computer networks, like the electrical power grid, to cause disruption and panic among citizens.
cyberwarfare
describes an attack whose goal ranges from disabling a
government’s computer network to crippling a country.
Data mining
the process of sifting through Big Data to find answers to the important questions that will yield fruitful results.
cyber extortionist
an individual who threatens to expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization’s network — if they are not paid a sum of money.
Technology ethics
the moral guidelines that govern the use of computers, mobile devices, information systems, and related technologies.
Intellectual property (IP) rights
the rights to which creators are entitled to their work.
Creative Commons
provides a framework for defining how content may or may not be used, along with any restrictions or payment needed to use it.
bot
a program that performs a repetitive task on a network.