Cybersecurity and Digital Access: Key Concepts in Computing and Data Privacy

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/13

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 11:39 PM on 5/9/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

14 Terms

1
New cards

digital divide

The idea that some communities or populations have less access to computing than others, typically due to limitations of Internet speed or computer hardware access.

2
New cards

crowdsourcing

A model in which many online users combine efforts to help fund projects, generate ideas, or create goods or services (like Wikipedia).

3
New cards

citizen science

Crowdsourcing for science! The participation of volunteers from the public in a scientific research project (like collecting rain samples or counting butterflies).

4
New cards

Creative Commons

An alternative to copyright that allows people to declare how they want their artistic creations to be shared, remixed, used in noncommercial contexts, and how the policy should propagate with remixed versions.

5
New cards

open access

A policy that allows people to have access to documents (like research papers) for reading or data (like government datasets) for analysis.

6
New cards

PII (Personally identifiable information)

Information about an individual that can be used to uniquely identify them (directly or indirectly).

7
New cards

multifactor authentication (MFA)

A method of user authentication which requires the user to present multiple pieces of evidence in multiple categories (such as knowledge and possession).

8
New cards

encryption

The process of scrambling data to prevent unauthorized access.

9
New cards

symmetric encryption

A technique for encrypting data where the same key is used to both encrypt and decrypt data.

10
New cards

public key encryption

An asymmetric encryption technique that uses different keys for encrypting versus decrypting data.

11
New cards

cookie

A small amount of text that tracks information about a user visiting a website.

12
New cards

virus

A type of computer malware that can make copies of itself.

13
New cards

phishing

An attack where a user is tricked into revealing private information, often via a deceptive email.

14
New cards

rogue access point

A wireless access point that provides an attacker with unauthorized access to the traffic going over the network.