1/27
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
What is Digital Rights Management (DRM)?
A collection of techniques used to control the use of intellectual property in digital formats.
What does the Digital Millennium Copyright Act (DMCA) prohibit?
It prohibits circumventing technological access controls like DRM and provides a 'safe harbor' for websites against copyright infringement lawsuits.
What is Creative Commons?
A licensing framework that enables authors to specify what permissions they grant to the public for the use of their work.
What is Free Software?
Software that allows people to copy, use, and modify it, emphasizing freedom of use rather than lack of cost.
What is Copyleft?
A concept where software can be freely used, modified, and shared, but all derivative works must be distributed under the same free terms.
What is a Patent Troll?
A company that acquires patents to profit by licensing them or suing other companies for infringement.
What defines Hacking?
The intentional, unauthorized access to computer systems.
What is Hacktivism?
The use of hacking to promote a political cause, such as using a Denial-of-Service attack to shut down a website in protest.
What is a Denial-of-Service (DoS) Attack?
An attack designed to shut down a website or service by overwhelming it with traffic, focusing on disruption rather than theft.
Who is a Gray Hat Hacker?
A hacker who finds vulnerabilities in a system and publishes their findings before or without notifying the system's owners.
What is Stuxnet?
A sophisticated worm that targeted and damaged physical industrial equipment, specifically a uranium enrichment plant in Iran.
What does the Computer Fraud and Abuse Act (CFAA) criminalize?
Unauthorized access to computer systems.
What is a Honey Pot in cybersecurity?
A website, system, or decoy server set up to attract and record hackers, allowing their methods to be studied.
What is Phishing?
Using fraudulent e-mails disguised as legitimate communications to 'fish' for personal and financial information.
What is Pharming?
A technique that redirects users from a legitimate website to a fake one without their awareness, often by poisoning the Domain Name Server (DNS).
What is Vishing?
Voice phishing; using fraudulent phone calls or texts to steal information.
What is Telecommuting?
Working from home using a computer that is electronically linked to one's place of employment.
What is Offshoring?
The practice of moving business processes or services to another country, usually to reduce costs.
What does the Electronic Communications Privacy Act (ECPA) prohibit?
It prohibits the interception of email but allows employers to monitor communications on company-owned systems.
What is GPS Tracking in a workplace context?
Using GPS to track an employee's location, which can be seen as an invasion of personal boundaries.
What is the Wisdom of the Crowd?
The idea that information from millions of participants can be useful, but it can also be easily manipulated.
What is a Filter Bubble?
The result of algorithms filtering content based on a user's past behavior, reinforcing existing beliefs.
What does Abdicating Responsibility refer to?
A 'mental laziness' where people let computers make decisions instead of using human judgment.
What are Computer Models used for?
Simulations that allow companies to test products and explore hypothetical outcomes.
What is the Digital Divide?
The gap in technology access, now defined by the quality and level of service available.
Who are Neo-Luddites?
Critics of technology who argue that computers cause social disintegration and isolation.
What is the Technological Singularity?
A theoretical point in time when artificial intelligence advances beyond human comprehension.
What is Decentralized Decision-Making?
A noncoercive approach to technology decisions aimed at reducing mistakes and manipulation by large companies.