Chapter 5_Digital Security, Ethics, and Privacy Part I

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/21

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

22 Terms

1
New cards

Digital Security Risk

Any event or action that could cause a loss of or damage to computer or mobile device hardware, software, data, information, or processing capability.

2
New cards

Cybercrime

Intentional breach of digital security involving a deliberate illegal act, such as distributing malware or identity theft.

3
New cards

Computer Crimes

Illegal acts involving computers.

4
New cards

Cybersecurity

Protection against digital threats and unauthorized access to data.

5
New cards

Digital Forensics

The discovery, collection, and analysis of digital evidence.

6
New cards

Data Breaches

Unauthorized access to confidential data, typically resulting in data theft.

7
New cards

Malware

Malicious software that deliberately alters the operations of computers and mobile devices.

8
New cards

Ransomware

A type of malware that blocks or limits access to a computer or file until a ransom is paid.

9
New cards

Phishing

A social engineering tactic to deceive users into revealing personal information.

10
New cards

Back Door

A method allowing users to bypass normal authentication procedures in a program, computer, or network.

11
New cards

Botnet

A network of compromised devices used to launch attacks on other networks.

12
New cards

Denial of Service Attack (DoS)

An attack designed to overload a server with traffic, disrupting its services.

13
New cards

Intellectual Property Rights

Legal entitlements that creators have over their creations.

14
New cards

Copyright Law

Laws that protect the use and distribution of original works.

15
New cards

Fair Use

Limited use of copyrighted material without permission for educational or critical purposes.

16
New cards

Green Computing

Reducing electricity and environmental waste while using technology.

17
New cards

VPN (Virtual Private Network)

A service that creates a secure, encrypted connection over a less secure network, such as the Internet.

18
New cards

Firewall

A network security system that monitors and controls incoming and outgoing network traffic.

19
New cards

Access Control

Measures taken to ensure that only authorized users have access to confidential information.

20
New cards

Digital Detox

A period of refraining from technology to improve mental health.

21
New cards

Social Engineering

Manipulation techniques used to deceive individuals into divulging confidential information.

22
New cards

Cloud Data Privacy

Concerns about the security and confidentiality of data stored online.