Chapter 9: Privacy, Security, and Ethics

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/62

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

63 Terms

1
New cards

computer technology concerns

privacy

security

ethics

2
New cards

privacy

concerns the collection and use of data about individuals

3
New cards

3 primary privacy issues

accuracy - data collected must be correct

property - relates to who owns data

access - responsibility of those who have data to control who is able to use that data

4
New cards

big data 

ever-growing volume of data currently being collected 

5
New cards

digital footprint

collection of data that can be searched to reveal a highly detailed account of an individual’s life

6
New cards

information resellers/information brokers

gathers personal data on people and sells it to direct marketers, fund-raisers, and others, usually for a fee 

7
New cards

mistaken identity

occurs when electronic profile of one person is switched with another

8
New cards

Freedom of Information Act

law giving citizens right to examine data about them in federal government files, except for information restricted for national security reasons

9
New cards

employee-monitoring software 

programs that record virtually every activity on a computer system 

10
New cards

illusion of anonymity 

misconception that being selective about disclosing personal information on internet can prevent an invasion of personal privacy 

11
New cards

deep web 

comprised of websites designed to be hidden from standard search engines to allow communication in a secure and anonymous manner 

12
New cards

dark web

part of deep web consisting of sites that use special software to hide a user’s IP address and makes it nearly impossible to identify who is using the site

13
New cards

history files 

include locations/addresses of sites you have recently visited 

14
New cards

temporary internet files/browser cache

contain web page content and instructions for displaying this content

15
New cards

cookies

small data files that are deposited on your hard disk from websites you have visited

16
New cards

first-party cookie 

generated only by website you are currently visiting 

17
New cards

third-party cookie

generated by ad company affiliated with website you are currently visiting

18
New cards

privacy mode

ensures browsing activity is not recorded on your computer

19
New cards

web bugs 

invisible images or HTML code hidden within a web page or email message

transmit info without your knowledge 

20
New cards

spyware

wide range of programs designed to secretly record and report an individual’s activities on internet

21
New cards

computer monitoring software

record every activity made on ur computer

22
New cards

keylogger

records every activity and keystroke made on your computer system 

23
New cards

antispyware/spyware removal programs

designed to detect and remove various types of privacy threats

24
New cards

online identity

information people voluntarily post about themselves online

25
New cards

General Data Protection Regulation GDPR

regulates processing of personal data for all organizations that collect or process data about EU citizens 

26
New cards

Gramm-Leach-Bliley Act

protects personal financial information

27
New cards

Health Insurance Portability and Accountability Act HIPAA

protects medical records

28
New cards

Family Educational Rights and Privacy Act FERPA

restricts disclosure of educational records 

29
New cards

California Consumer Privacy Act CCPA

allows consumers to see all data a company has collected on them and any third parties that data has been shared with

30
New cards

security 

protection of information, hardware, and software 

31
New cards

cybercrime/computer crime

any criminal offense that involves a computer and a network

cyberterrorism- politically motivated

32
New cards

identity theft 

illegal assumption of someone’s identity for purposes of economic gain 

33
New cards

internet scams

phishing

advanced-fee scam

greeting card scam

bank loan/credit card scam

lottery scam

34
New cards

data manipulation

unauthorized access of a computer network and copying files to or from server

35
New cards

ransomware 

malicious software that encrypts your computer’s data and ransoms password to user 

36
New cards

denial of service DoS attacks

attempt to slow down or stop a computer system or network by flooding a computer or network with requests for info and data

distributed denial of service DDoS

37
New cards

social engineering

practice of manipulating people to divulge private data

38
New cards

cracker 

computer criminal who creates and distributes malicious programs/malware 

39
New cards

viruses

programs that migrate through networks and operating systems and attach to other programs and databases

40
New cards

worms

programs that replicate themselves over and over again

41
New cards

Trojan horse

programs that appear to be harmless but have malware 

42
New cards

zombies

computers infected by a virus, worm, or trojan horse

collection is a botnet

43
New cards

rogue wifi hotspots

imitate free wifi networks

capture user information

44
New cards

infected USB flash drives 

have viruses and other malware 

45
New cards

computer fraud and abuse act

makes it a crime for unauthorized persons even to view data using any computer across state lines

46
New cards

password

secret words or phrases that must be keyed into a computer system to gain access

47
New cards

dictionary attack 

uses software to try thousands of common words sequentially to gain unauthorized access to a user’s account 

48
New cards

security suites

provide a collection of utility programs designed to protect your privacy and security while you are on the web

49
New cards

firewalls

act as a security buffer between a corporation’s private network and all external networks, including internet

50
New cards

password managers 

help create strong passwords 

51
New cards

authentication

process of ensuring identity of a user

52
New cards

encryption

process of coding information to make it unreadable except to those who have a special piece of info known as encryption key/key

53
New cards

physical security 

concerned with protecting hardware from possible human and natural disasters 

54
New cards

data security

concerned with protecting software and data from unauthorized tampering or damage

55
New cards

disaster recovery plans

describe ways to continue operating until normal computer operations can be restored

56
New cards

ethics

standards of moral conduct 

57
New cards

computer ethics

guidelines for morally acceptable use of computers in our society

58
New cards

cyberbullying

use of internet to send or post content intended to hurt or embarrass another person

harrassment

doxing

false statements or images

outing

59
New cards

copyright 

legal concept that gives content creators right to control the use and distribution of their work 

60
New cards

software piracy

unauthorized copying and/or distribution of software

61
New cards

digital rights management DRM

encompasses various technologies that control access to electronic media and files

62
New cards

Digital Millenium Copyright Act 

makes it illegal to deactivate or otherwise disable any antipiracy technologies including DRM 

63
New cards

plagiarism

representing some other person’s work and ideas as your own without giving credit to the original source