1/44
These vocabulary flashcards cover key security threats, encryption methods, network defenses, data-tracking tools, analytics metrics, and digital-marketing strategies essential to understanding modern e-commerce and online marketing environments.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Worm
A self-replicating malicious program that spreads autonomously across computers and networks.
Trojan Horse
Malicious software disguised as legitimate in order to trick users into installing it.
Phishing Attack
A fraudulent attempt, often via email or fake websites, to obtain sensitive information such as passwords or credit-card numbers.
Spoofing
Faking an identity—such as an email address, IP address, or website URL—to deceive a target.
TLS (Transport Layer Security)
Cryptographic protocol that encrypts data transmitted over a network, securing web, email, and other communications.
Digital Cash
Electronic form of currency used for online transactions.
Cybercrime
Any criminal activity that involves computers, networks, or digital devices.
E-Commerce Security Principles
Key goals of secure online transactions: integrity, non-repudiation, authenticity, confidentiality, privacy, and availability.
Vulnerability
A weakness in hardware, software, or procedures that can be exploited by threats.
Botnet
A network of compromised computers controlled remotely to perform malicious tasks.
Spyware
Software that secretly collects user data and transmits it to a third party.
Symmetric Encryption
Cryptography that uses the same secret key for both encryption and decryption.
Public-Key (Asymmetric) Encryption
Cryptography that uses a public key for encryption and a private key for decryption.
Firewall
Hardware or software system that monitors and controls incoming and outgoing network traffic based on security rules.
Proxy Server
An intermediary server that handles client requests to improve privacy, security, or performance.
Intrusion Detection System (IDS)
Software or hardware that monitors a network or system for signs of malicious activity.
Access Control
Mechanisms that restrict access to resources based on user permissions and roles.
Transaction File (Log)
Digital record of all transactions or activities occurring on a site or system.
Cookie
Small data file stored on a user’s device by a website to remember preferences or track activity.
Digital Divide
The gap between individuals or communities that have access to digital technology and those that do not.
Hadoop
Open-source framework that enables distributed processing and storage of large data sets.
Bundling
Marketing strategy of selling multiple products or services together as a single combined offering.
Versioning
Offering a product in multiple editions or tiers to serve different customer segments.
Interest-Based Advertising (Behavioral Targeting)
Delivering ads to users based on their browsing behavior, searches, purchases, or social-media activity.
CAN-SPAM Act
U.S. law that sets rules for commercial email, including opt-out requirements and penalties for violations.
Omnichannel (Comprehensive) Marketing
Coordinated marketing approach that integrates online and offline platforms for a seamless customer experience.
Impression
One display of an online advertisement to a user.
Click-Through Rate (CTR)
Percentage of ad impressions that result in a user clicking the advertisement.
View-Through Conversion
When a user sees an ad, does not click it, but later visits and converts on the advertiser’s site.
Hits
Individual server requests for files; not a reliable measure of website traffic or engagement.
Stickiness
Metric describing how long visitors stay and how often they return to a website.
Web Beacon (Pixel Tag)
Invisible graphic embedded in a webpage or email to track user behavior.
SQL (Structured Query Language)
Standard language for managing and querying relational databases.
CRM System
Customer Relationship Management software used to manage interactions and data throughout the customer lifecycle.
Marginal Cost
The additional cost incurred by producing one extra unit of a good or service.
Mobile Commerce (m-Commerce)
Buying and selling goods or services through mobile devices such as smartphones and tablets.
Desktop Marketing
Traditional online marketing activities aimed at users on desktop or laptop computers.
Social Marketing
Use of social media platforms to influence user attitudes or behaviors in favor of a brand or cause.
Graph Search
Search technology that queries social-network relationships and content (e.g., friends, likes, check-ins).
Fan Acquisition
Process of gaining followers, subscribers, or fans on social-media platforms.
Amplification
Extent to which users share or repost content, increasing its reach.
Curalate
Platform specializing in visual marketing and social commerce, enabling brands to leverage images for engagement and sales.
Location-Based Marketing
Delivering messages or offers to users based on their real-time geographic location.
Social Density
Level and frequency of interaction and sharing among users on a platform.
Geo-fencing
Creating a virtual perimeter around a geographic area that triggers a digital action when a device enters or leaves it.