Big Idea 5

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/30

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

31 Terms

1
New cards

Asymmetric ciphers

Uses two keys (public and private) for encryption and decryption.

2
New cards

Authentication

Verifying a user's identity before granting access.

Examples: Passwords, biometrics, security tokens.

3
New cards

Bias

A tendency to favor certain outcomes, often unintentionally.

4
New cards

Certificate Authority (CA)

A trusted organization that issues digital certificates to verify identities online.

5
New cards

Citizen science

Public participation in scientific research and data collection.

6
New cards

Computer virus

Malicious software that self-replicates and spreads to other devices.

7
New cards

Creative Commons Licensing

A legal framework allowing creators to share content with specific permissions.

8
New cards

Crowdfunding

Raising small amounts of money from a large number of people online.

9
New cards

Crowdsourcing

Obtaining input, ideas, or labor from a large group of people online.

10
New cards

Cybersecurity

Practices to protect systems, networks, and data from cyber threats.

11
New cards

Data mining

Extracting useful patterns and information from large datasets.

12
New cards

Decryption

The process of converting encrypted data back into its original form.

13
New cards

Digital divide

The gap between those with access to digital technology and those without.

14
New cards

Encryption

The process of converting data into unreadable code to protect it from unauthorized access.

15
New cards

Intellectual property

Creations of the mind (inventions, art, software) that are legally protected.

16
New cards

Keylogging

A type of spyware that records keystrokes to steal information.

17
New cards

Malware

Malicious software designed to harm or exploit devices and data.

18
New cards

Multifactor authentication

Requires multiple verification steps for stronger security (e.g., password + OTP).

19
New cards

Open access

Free and unrestricted access to research papers and scholarly content.

20
New cards

Open source

Software with publicly available source code that anyone can modify and distribute.

21
New cards

PII (Personally Identifiable Information)

Data that can identify an individual (e.g., name, SSN, email).

22
New cards

Phishing

A cyber attack where attackers trick users into revealing sensitive information.

23
New cards

Plagiarism

Using someone else's work or ideas without proper credit.

24
New cards

Public key encryption

A type of asymmetric encryption using a public key to encrypt and a private key to decrypt.

25
New cards

Rogue access point

An unauthorized Wi-Fi access point that poses security risks.

26
New cards

Symmetric key

Encryption where the same key is used for both encryption and decryption.

27
New cards

Encryption

Converting data into a coded format to protect it from unauthorized access.

28
New cards

Targeted marketing

Advertising tailored to users based on their data and behavior.

29
New cards

Machine Learning

Computers learn from data to make predictions or decisions (e.g, AI).

30
New cards

Cloud Computing

Storing and accessing data or programs over the internet instead of on a local computer.

31
New cards

WWW (World Wide Web)

A system of interlinked web pages and resources accessed through the internet using browsers.