Fluency with Information Technology - Chapter 12

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/35

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

36 Terms

1
New cards

Four types on controls on information

No use; Opt in; Opt out; No limit; (+ internal use)

2
New cards

Online tracking

Web site automatically sending details about your visit to other content providers (to show you ads and other products)

3
New cards

Cell phone tracking

positioning information, used to map your physical location

4
New cards

Cookie

a record containing seven fields of information

that uniquely identify a customer's session

5
New cards

Third party cookies

cookies put on a computer by those other than the website being visited, such as advertisers inserting their own cookies on a web page

6
New cards

Identity theft

A crime that involves someone pretending to be another person in order to steal money or obtain benefits

7
New cards

Malware

software that is intended to damage or disable computers and computer systems.

8
New cards

Virus

A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data

9
New cards

Worm

a software program capable of reproducing itself that can spread from one computer to the next over a network

10
New cards

Exploit

Describes when software takes advantage of bugs in software

11
New cards

Trojan

A program disguised as a harmless application that actually produces harmful results.

12
New cards

Backdoor

Software code that gives access to a program or a service that circumvents normal security protections.

13
New cards

Rootkit

program that hides in a computer and allows someone from a remote location to take full control of the computer

14
New cards

ciphertext

A string of text that has been converted to a secure form using encryption.

15
New cards

cleartext

Unencrypted data

16
New cards

key

Used to encrypt data

17
New cards

Secure communication

message exchange in which the content is encrypted to keep it private

18
New cards

Private key encryption

A type of encryption that uses a single key to encrypt and decrypt the file or message.

19
New cards

Symmetric key cryptography

Another name for private key encryption

20
New cards

the computer itself

Private browsing does not store data on _____

21
New cards

Quality

You discover that credit information about you is inaccurate. Which principle does this violate?

22
New cards

Fair information practices

Information from people in EU countries can be shared outside of the EU, providing

the business or government follows the principles of _______

23
New cards

Privacy

_______ is the right of people to choose freely under what circumstances and to

what extent they will reveal themselves, their attitude, and their behavior to others.

24
New cards

Cash

_____ is an anonymous form of payment

25
New cards

OECD (Organization for Economic Cooperation and Development)

The _______ serve as a guideline for protecting personal privacy in regard to international

trade.

26
New cards

Fair information practices

The _______ provides a benchmark by which businesses can measure how well they

are protecting the privacy of individuals.

27
New cards

businesses; governments

The Fair Information Practices standards conflict with the information gathering

goals of _______ and _______.

28
New cards

2 way cipher

A(n) _______ is a combination of encryption and decryption.

29
New cards

RSA

The _______ cryptosystem is the best-known public key cryptosystem.

30
New cards

Spyware

_______ is software that monitors and records details of computer usage.

31
New cards

increases

The difficulty of factoring _______ as the key grows in size.

32
New cards

Data controller

A(n) _______ is responsible for maintaining personal information and is held

accountable for it.

33
New cards

Patriot

The _______ act ended Americans reasonable protection from government

snooping.

34
New cards

Cleartext

_______ is information before it is encrypted.

35
New cards

DoNotTrack

Setting _______ in your browser may stop certain Web sites from tracking you.

36
New cards

Worms

_______ contain code that reproduces itself when the program runs.