1/26
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
DDos
(Distributed Denial of Service) cyberattack where a service is intentionally flooded with traffic to make it unusable
RFID
(Radio Frequency Identification) a technology that uses electromagnetic fields to track, identify or manage people or objects
DNS
(Domain Name System) a sort of phonebook of the internet, used to translate domain names (ex: google.com) into computer readable IPs
SEME
(Search Engine Manipulation Effect) a phenomenon where search engine companies can make certain results appear first and more frequently in order to sway public opinion
Mirai Botnet
(2016) a piece of malware infecting Linux devices that use the IoT, adding them to a server that made them vulnerable to DDoS attacks
Panopticon
a surveillance concept where a small, powerful group observes the masses while those being watched have no power, control or awareness of when and how they are observed
4 Types: Foucault (Prison), Pauper (Pauper House/public service), Chrestomatic (School), Constitutional (Governmental)
TCP/IP
a set of protocols independent of physical media used to transmit data; four layers: Application, Transport, Internet, and Network Access
Internet
a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols
Cyber-Physical Systems
the integration of algorithms into physical components, where software controls and monitors physical processes
Constrained Network Code
a technique in digital communication and storage that restricts what kinds of sequences are allowed in order to fulfill physical channel requirements
NotPetya
(2017) a series of ransomware cyberattacks directed at Ukranian organization websites; similar, smaller scale attacks were also directed at France, Germany, Italy, Poland, Russia, the UK, the US, and Australia
Predictive Policing
the use of data and analytical techniques in law enforcement in order to identify criminal activity, locations, or offenders before it can occur
Stuxnet
started in 2007, a computer program discovered in 2010 used for supervisory control and data acquisition and to cause damage to the Iranian nuclear program
Souseveillance
a modern phenomenon where all individuals carry a recording device with them, allowing for those in power to be recorded by the masses just as much as the masses are recorded themselves
Net Neutrality
principle that all Internet Service Providers must treat all data equally, regardless of its source or destination
Surveillance Capitalism
economic system based around the tracking and gathering of human generated data, as well as the commodification of human behavior to generate capital and to influence individual actions
Biometric Data
unique physical/behavioral human traits (fingerprints, facial features, eye color, etc.) used for automated recognition, authentication, and security
Haptic Technologies
bridge the gap between the physical and digital world by simulating the sensation of touch through vibrations, motions, or forces
FIPP
(Fair Information and Practice Principles) a framework for privacy in policy discussions in the US, Canada and parts of Asia, prioritizes transparency, individual participation, data minimization, use limitations, etc.
Communications Decency Act
interactive computer services aren’t liable for content transmitted/generated on their platforms
WannaCry
2017 ransomware attack exploiting a vulnerability in Windows sytems, North Korea used malicious code kept secret by the NSA (National Security Agency)
Spear Phishing
attempts to gain access to a site’s source code in order to use compromised assets to acquire user credentials
Grizzly Steppe
2016 Russian spear phishing attempt in order to disrupt an election
GDPR
EU’s outline for privacy laws
WHOIS
a freely available, searchable, global directory allowing for the browsing of names and personal info of people registered under a particular domain; what kind of info is available has been shaped by the GDPR
cyber
(linguistic) refers to international conflict/national security
internet
(linguistic) refers to technical architecture and free speech online