Privacy In the Digital Age Midterm

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/26

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 2:15 AM on 3/24/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

27 Terms

1
New cards

DDos

(Distributed Denial of Service) cyberattack where a service is intentionally flooded with traffic to make it unusable

2
New cards

RFID

(Radio Frequency Identification) a technology that uses electromagnetic fields to track, identify or manage people or objects

3
New cards

DNS

(Domain Name System) a sort of phonebook of the internet, used to translate domain names (ex: google.com) into computer readable IPs

4
New cards

SEME

(Search Engine Manipulation Effect) a phenomenon where search engine companies can make certain results appear first and more frequently in order to sway public opinion

5
New cards

Mirai Botnet

(2016) a piece of malware infecting Linux devices that use the IoT, adding them to a server that made them vulnerable to DDoS attacks

6
New cards

Panopticon

a surveillance concept where a small, powerful group observes the masses while those being watched have no power, control or awareness of when and how they are observed
4 Types: Foucault (Prison), Pauper (Pauper House/public service), Chrestomatic (School), Constitutional (Governmental)

7
New cards

TCP/IP

a set of protocols independent of physical media used to transmit data; four layers: Application, Transport, Internet, and Network Access

8
New cards

Internet

a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols

9
New cards

Cyber-Physical Systems

the integration of algorithms into physical components, where software controls and monitors physical processes

10
New cards

Constrained Network Code

a technique in digital communication and storage that restricts what kinds of sequences are allowed in order to fulfill physical channel requirements

11
New cards

NotPetya

(2017) a series of ransomware cyberattacks directed at Ukranian organization websites; similar, smaller scale attacks were also directed at France, Germany, Italy, Poland, Russia, the UK, the US, and Australia

12
New cards

Predictive Policing

the use of data and analytical techniques in law enforcement in order to identify criminal activity, locations, or offenders before it can occur

13
New cards

Stuxnet

started in 2007, a computer program discovered in 2010 used for supervisory control and data acquisition and to cause damage to the Iranian nuclear program

14
New cards

Souseveillance

a modern phenomenon where all individuals carry a recording device with them, allowing for those in power to be recorded by the masses just as much as the masses are recorded themselves

15
New cards

Net Neutrality

principle that all Internet Service Providers must treat all data equally, regardless of its source or destination

16
New cards

Surveillance Capitalism

economic system based around the tracking and gathering of human generated data, as well as the commodification of human behavior to generate capital and to influence individual actions

17
New cards

Biometric Data

unique physical/behavioral human traits (fingerprints, facial features, eye color, etc.) used for automated recognition, authentication, and security

18
New cards

Haptic Technologies

bridge the gap between the physical and digital world by simulating the sensation of touch through vibrations, motions, or forces

19
New cards

FIPP

(Fair Information and Practice Principles) a framework for privacy in policy discussions in the US, Canada and parts of Asia, prioritizes transparency, individual participation, data minimization, use limitations, etc.

20
New cards

Communications Decency Act

interactive computer services aren’t liable for content transmitted/generated on their platforms

21
New cards

WannaCry

2017 ransomware attack exploiting a vulnerability in Windows sytems, North Korea used malicious code kept secret by the NSA (National Security Agency)

22
New cards

Spear Phishing

attempts to gain access to a site’s source code in order to use compromised assets to acquire user credentials

23
New cards

Grizzly Steppe

2016 Russian spear phishing attempt in order to disrupt an election

24
New cards

GDPR

EU’s outline for privacy laws

25
New cards

WHOIS

a freely available, searchable, global directory allowing for the browsing of names and personal info of people registered under a particular domain; what kind of info is available has been shaped by the GDPR

26
New cards

cyber

(linguistic) refers to international conflict/national security

27
New cards

internet

(linguistic) refers to technical architecture and free speech online

Explore top notes

note
Richard III
Updated 1239d ago
0.0(0)
note
Group 16 elements
Updated 1346d ago
0.0(0)
note
Ethics in Health Care
Updated 1197d ago
0.0(0)
note
Political History
Updated 1198d ago
0.0(0)
note
Developmental Psych Chapter 19
Updated 1284d ago
0.0(0)
note
Untitled Flashcards Set
Updated 466d ago
0.0(0)
note
Verben Conjugations
Updated 415d ago
0.0(0)
note
Richard III
Updated 1239d ago
0.0(0)
note
Group 16 elements
Updated 1346d ago
0.0(0)
note
Ethics in Health Care
Updated 1197d ago
0.0(0)
note
Political History
Updated 1198d ago
0.0(0)
note
Developmental Psych Chapter 19
Updated 1284d ago
0.0(0)
note
Untitled Flashcards Set
Updated 466d ago
0.0(0)
note
Verben Conjugations
Updated 415d ago
0.0(0)

Explore top flashcards

flashcards
poznávačka rostliny
95
Updated 421d ago
0.0(0)
flashcards
ANTHC101 EXAM #1
97
Updated 386d ago
0.0(0)
flashcards
El bienestar
52
Updated 1168d ago
0.0(0)
flashcards
IST Summitive Ms Yunus 9th
25
Updated 189d ago
0.0(0)
flashcards
Autoteile Vokabeln
43
Updated 1037d ago
0.0(0)
flashcards
AP Lang Rhetorical Devices
80
Updated 482d ago
0.0(0)
flashcards
Unit 8: The New South
20
Updated 46d ago
0.0(0)
flashcards
poznávačka rostliny
95
Updated 421d ago
0.0(0)
flashcards
ANTHC101 EXAM #1
97
Updated 386d ago
0.0(0)
flashcards
El bienestar
52
Updated 1168d ago
0.0(0)
flashcards
IST Summitive Ms Yunus 9th
25
Updated 189d ago
0.0(0)
flashcards
Autoteile Vokabeln
43
Updated 1037d ago
0.0(0)
flashcards
AP Lang Rhetorical Devices
80
Updated 482d ago
0.0(0)
flashcards
Unit 8: The New South
20
Updated 46d ago
0.0(0)