Untitled Flashcards Set

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/24

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

25 Terms

1
New cards

Third Amendment

Prohibits the quartering of soldiers in private homes without the owner's consent.

2
New cards

Fourth Amendment

Protects against unreasonable searches and seizures.

3
New cards

Exclusionary Rule

A legal rule that excludes evidence obtained in violation of a defendant's constitutional rights.

4
New cards

RFID

Radio-Frequency Identification, a technology that uses radio waves to automatically identify objects.

5
New cards

Targeted Direct Mail

Direct mail advertising tailored to specific groups of consumers based on data.

6
New cards

Children’s Online Privacy Protection Act (COPPA)

A law that protects the privacy of children under 13 years old online.

7
New cards

Opt-in

A marketing strategy where consumers must give explicit consent to receive messages.

8
New cards

Opt-out

A system that allows consumers to refuse receiving marketing messages.

9
New cards

Federal Communications Act

Regulates interstate and foreign communications by radio, television, wire, satellite, and cable.

10
New cards

Anonymous

Not identified by name; lacking identifiable features.

11
New cards

Denial-of-Service Attack

A cyber attack aimed at making a machine or network resource unavailable.

12
New cards

Social Engineering

Psychological manipulation to trick individuals into divulging confidential information.

13
New cards

Collaborative Filtering

A technique used by recommender systems to make predictions about users' interests.

14
New cards

Password

A secret word or phrase used to authenticate a user.

15
New cards

Botnet

A network of compromised computers controlled by a single entity known as a bot herder.

16
New cards

Virus

A type of malicious software that replicates itself and infects other programs.

17
New cards

Trojan

A type of malware that misleads users of its true intent.

18
New cards

Worm

A standalone malware that replicates itself to spread to other computers.

19
New cards

Sidejacking

Hijacking a user's web session to gain unauthorized access to information.

20
New cards

Drive-By Downloads

Malware that is downloaded without the user's knowledge while visiting a website.

21
New cards

Spyware

Software that secretly monitors user activities without their consent.

22
New cards

Adware

Software that automatically delivers advertisements to a user's computer.

23
New cards

Phishing

A method of trying to gather personal information using deceptive emails.

24
New cards

SQL Injection

A code injection technique that attackers use to exploit vulnerabilities in application software.

25
New cards

Rootkits

A collection of software tools used by hackers to facilitate unauthorized access to a computer.