1/24
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Third Amendment
Prohibits the quartering of soldiers in private homes without the owner's consent.
Fourth Amendment
Protects against unreasonable searches and seizures.
Exclusionary Rule
A legal rule that excludes evidence obtained in violation of a defendant's constitutional rights.
RFID
Radio-Frequency Identification, a technology that uses radio waves to automatically identify objects.
Targeted Direct Mail
Direct mail advertising tailored to specific groups of consumers based on data.
Children’s Online Privacy Protection Act (COPPA)
A law that protects the privacy of children under 13 years old online.
Opt-in
A marketing strategy where consumers must give explicit consent to receive messages.
Opt-out
A system that allows consumers to refuse receiving marketing messages.
Federal Communications Act
Regulates interstate and foreign communications by radio, television, wire, satellite, and cable.
Anonymous
Not identified by name; lacking identifiable features.
Denial-of-Service Attack
A cyber attack aimed at making a machine or network resource unavailable.
Social Engineering
Psychological manipulation to trick individuals into divulging confidential information.
Collaborative Filtering
A technique used by recommender systems to make predictions about users' interests.
Password
A secret word or phrase used to authenticate a user.
Botnet
A network of compromised computers controlled by a single entity known as a bot herder.
Virus
A type of malicious software that replicates itself and infects other programs.
Trojan
A type of malware that misleads users of its true intent.
Worm
A standalone malware that replicates itself to spread to other computers.
Sidejacking
Hijacking a user's web session to gain unauthorized access to information.
Drive-By Downloads
Malware that is downloaded without the user's knowledge while visiting a website.
Spyware
Software that secretly monitors user activities without their consent.
Adware
Software that automatically delivers advertisements to a user's computer.
Phishing
A method of trying to gather personal information using deceptive emails.
SQL Injection
A code injection technique that attackers use to exploit vulnerabilities in application software.
Rootkits
A collection of software tools used by hackers to facilitate unauthorized access to a computer.