Chapter 5: Digital Security, Ethics, and Privacy: Avoiding and Recognizing Threats CIT 100 - Computer Literacy Fall 2025

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/18

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

19 Terms

1
New cards

risk

any possibility that something might occur resulting in an injury or a loss.

2
New cards

digital security risk

any event or action that could cause a loss of or damage to computer or mobile device hardware, software, data, information, or processing capability.

3
New cards

Types of digital security risks include threats to our

information, physical health, mental health,
and the environment.

4
New cards

Cybersecurity

the practice of protection against digital threats, including unauthorized or illegal access to data.

5
New cards

digital detox

a period of time during which an individual refrains from using
technology.

6
New cards

Threat actor

the technical term used to describe individuals who launch attacks against other users and their computers. They may also be called attackers.

7
New cards

dark web

a part of the web that is accessed using specialized software, where users and website operators can remain anonymous while performing illegal actions

8
New cards

Script kiddies

individuals who want to attack computers but lack the knowledge of computers and networks

9
New cards

hacker

a person who intends to access a computer system without permission

10
New cards

cracker

someone who accesses a computer or network illegally but has the intent of destroying data, stealing information, or other malicious action.

11
New cards

Hacktivists

attackers who are strongly motivated by principles or beliefs

12
New cards

Cyberterrorists

attack a nation’s computer networks, like the electrical power grid, to cause disruption and panic among citizens.

13
New cards

cyberwarfare

describes an attack whose goal ranges from disabling a
government’s computer network to crippling a country.

14
New cards

Data mining

the process of sifting through Big Data to find answers to the important questions that will yield fruitful results.

15
New cards

cyber extortionist

an individual who threatens to expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization’s network — if they are not paid a sum of money.

16
New cards

Technology ethics

the moral guidelines that govern the use of computers, mobile devices, information systems, and related technologies.

17
New cards

Intellectual property (IP) rights

the rights to which creators are entitled to their work.

18
New cards

Creative Commons

provides a framework for defining how content may or may not be used, along with any restrictions or payment needed to use it.

19
New cards

bot

a program that performs a repetitive task on a network.