Untitled Flashcards Set

studied byStudied by 0 people
0.0(0)
Get a hint
Hint

Third Amendment

1 / 24

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

25 Terms

1

Third Amendment

Prohibits the quartering of soldiers in private homes without the owner's consent.

New cards
2

Fourth Amendment

Protects against unreasonable searches and seizures.

New cards
3

Exclusionary Rule

A legal rule that excludes evidence obtained in violation of a defendant's constitutional rights.

New cards
4

RFID

Radio-Frequency Identification, a technology that uses radio waves to automatically identify objects.

New cards
5

Targeted Direct Mail

Direct mail advertising tailored to specific groups of consumers based on data.

New cards
6

Children’s Online Privacy Protection Act (COPPA)

A law that protects the privacy of children under 13 years old online.

New cards
7

Opt-in

A marketing strategy where consumers must give explicit consent to receive messages.

New cards
8

Opt-out

A system that allows consumers to refuse receiving marketing messages.

New cards
9

Federal Communications Act

Regulates interstate and foreign communications by radio, television, wire, satellite, and cable.

New cards
10

Anonymous

Not identified by name; lacking identifiable features.

New cards
11

Denial-of-Service Attack

A cyber attack aimed at making a machine or network resource unavailable.

New cards
12

Social Engineering

Psychological manipulation to trick individuals into divulging confidential information.

New cards
13

Collaborative Filtering

A technique used by recommender systems to make predictions about users' interests.

New cards
14

Password

A secret word or phrase used to authenticate a user.

New cards
15

Botnet

A network of compromised computers controlled by a single entity known as a bot herder.

New cards
16

Virus

A type of malicious software that replicates itself and infects other programs.

New cards
17

Trojan

A type of malware that misleads users of its true intent.

New cards
18

Worm

A standalone malware that replicates itself to spread to other computers.

New cards
19

Sidejacking

Hijacking a user's web session to gain unauthorized access to information.

New cards
20

Drive-By Downloads

Malware that is downloaded without the user's knowledge while visiting a website.

New cards
21

Spyware

Software that secretly monitors user activities without their consent.

New cards
22

Adware

Software that automatically delivers advertisements to a user's computer.

New cards
23

Phishing

A method of trying to gather personal information using deceptive emails.

New cards
24

SQL Injection

A code injection technique that attackers use to exploit vulnerabilities in application software.

New cards
25

Rootkits

A collection of software tools used by hackers to facilitate unauthorized access to a computer.

New cards

Explore top notes

note Note
studied byStudied by 5 people
... ago
5.0(1)
note Note
studied byStudied by 16 people
... ago
4.0(1)
note Note
studied byStudied by 10 people
... ago
5.0(1)
note Note
studied byStudied by 9 people
... ago
5.0(1)
note Note
studied byStudied by 69 people
... ago
5.0(3)
note Note
studied byStudied by 18 people
... ago
4.5(2)

Explore top flashcards

flashcards Flashcard (80)
studied byStudied by 13 people
... ago
4.0(1)
flashcards Flashcard (73)
studied byStudied by 15 people
... ago
4.5(2)
flashcards Flashcard (65)
studied byStudied by 2 people
... ago
5.0(1)
flashcards Flashcard (32)
studied byStudied by 1 person
... ago
5.0(1)
flashcards Flashcard (28)
studied byStudied by 242 people
... ago
5.0(5)
flashcards Flashcard (79)
studied byStudied by 12 people
... ago
5.0(1)
flashcards Flashcard (80)
studied byStudied by 2 people
... ago
5.0(1)
flashcards Flashcard (81)
studied byStudied by 228 people
... ago
5.0(4)
robot