Looks like no one added any tags here yet for you.
Citizen Science
When the general public contributes to scientific research by collecting or analyzing data.
Crowdsourcing
A broader concept where a task is outsourced to a large group of people, often via the internet.
Multifactor Authentication (MFA)
A security process that requires more than one method of authentication to verify a user’s identity.
Safe Computing
Best practices that protect devices and personal information from cyber threats.
Legal and Ethical Concerns
Matters related to privacy, data security, intellectual property rights, and responsible internet use.
DMCA Copyright Laws
The Digital Millennium Copyright Act, a U.S. law protecting copyrighted content, especially digital media.
Keylogging
A type of malware that secretly records every keystroke a user types.
Phishing Attacks
A cyberattack that tricks someone into giving away personal information by pretending to be a trustworthy source.
Rogue Access Points
Unauthorized Wi-Fi hotspots used by attackers to intercept data from unsuspecting users.
Trojan (Trojan Horse Virus)
Malware that disguises itself as a legitimate program but contains harmful code.
Public Key Encryption
A form of encryption using two keys: a public key for encryption and a private key for decryption.
Symmetric Encryption
Encryption that uses the same key for both encryption and decryption.
Asymmetric Encryption
Encryption that uses a public key for encryption and a private key for decryption.
Dropbox
A cloud storage service that allows users to upload, store, and share files online.