1/35
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
Four types on controls on information
No use; Opt in; Opt out; No limit; (+ internal use)
Online tracking
Web site automatically sending details about your visit to other content providers (to show you ads and other products)
Cell phone tracking
positioning information, used to map your physical location
Cookie
a record containing seven fields of information
that uniquely identify a customer's session
Third party cookies
cookies put on a computer by those other than the website being visited, such as advertisers inserting their own cookies on a web page
Identity theft
A crime that involves someone pretending to be another person in order to steal money or obtain benefits
Malware
software that is intended to damage or disable computers and computer systems.
Virus
A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
Worm
a software program capable of reproducing itself that can spread from one computer to the next over a network
Exploit
Describes when software takes advantage of bugs in software
Trojan
A program disguised as a harmless application that actually produces harmful results.
Backdoor
Software code that gives access to a program or a service that circumvents normal security protections.
Rootkit
program that hides in a computer and allows someone from a remote location to take full control of the computer
ciphertext
A string of text that has been converted to a secure form using encryption.
cleartext
Unencrypted data
key
Used to encrypt data
Secure communication
message exchange in which the content is encrypted to keep it private
Private key encryption
A type of encryption that uses a single key to encrypt and decrypt the file or message.
Symmetric key cryptography
Another name for private key encryption
the computer itself
Private browsing does not store data on _____
Quality
You discover that credit information about you is inaccurate. Which principle does this violate?
Fair information practices
Information from people in EU countries can be shared outside of the EU, providing
the business or government follows the principles of _______
Privacy
_______ is the right of people to choose freely under what circumstances and to
what extent they will reveal themselves, their attitude, and their behavior to others.
Cash
_____ is an anonymous form of payment
OECD (Organization for Economic Cooperation and Development)
The _______ serve as a guideline for protecting personal privacy in regard to international
trade.
Fair information practices
The _______ provides a benchmark by which businesses can measure how well they
are protecting the privacy of individuals.
businesses; governments
The Fair Information Practices standards conflict with the information gathering
goals of _______ and _______.
2 way cipher
A(n) _______ is a combination of encryption and decryption.
RSA
The _______ cryptosystem is the best-known public key cryptosystem.
Spyware
_______ is software that monitors and records details of computer usage.
increases
The difficulty of factoring _______ as the key grows in size.
Data controller
A(n) _______ is responsible for maintaining personal information and is held
accountable for it.
Patriot
The _______ act ended Americans reasonable protection from government
snooping.
Cleartext
_______ is information before it is encrypted.
DoNotTrack
Setting _______ in your browser may stop certain Web sites from tracking you.
Worms
_______ contain code that reproduces itself when the program runs.