Social and Economic Impact of ICT

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/18

flashcard set

Earn XP

Description and Tags

A set of vocabulary flashcards designed to review key concepts related to the social and economic impact of information and communications technology.

Last updated 12:12 AM on 4/11/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

19 Terms

1
New cards

Computer Security

Refers to the protection of computer systems and networks from unauthorized access, damage, theft, disruption, or misuse of data and resources.

2
New cards

Cybersecurity

A subset of computer security specifically focused on protecting systems and data from cyber threats.

3
New cards

Vulnerability

Weaknesses in a system that can be exploited by threats.

4
New cards

Threat

Any potential danger that can exploit a vulnerability to breach security.

5
New cards

Attack

An actual attempt to exploit a vulnerability by a threat agent.

6
New cards

Countermeasure

Defensive measures taken to mitigate the impact of threats and attacks.

7
New cards

Computer Misuse

Intentional, unauthorized, and harmful activity involving computers and networks.

8
New cards

Cyberbullying

Harassment, threats, or intimidation of individuals through digital means.

9
New cards

Denial of Service (DoS) Attack

Overloading a system or network to disrupt services.

10
New cards

Phishing Attack

Deceptive emails or messages to trick users into revealing sensitive information.

11
New cards

Data Theft

Unauthorized access and theft of sensitive data.

12
New cards

Identity Theft

Stealing personal information to impersonate someone for financial gain or fraud.

13
New cards

Industrial Espionage

Stealing trade secrets or intellectual property from businesses.

14
New cards

Hardware Firewall

A physical device that filters traffic between a computer network and the internet.

15
New cards

Biometrics

Authentication methods like fingerprint or retina scans for secure access.

16
New cards

Encryption of Data

Encoding data so that it cannot be read by unauthorized users.

17
New cards

Antivirus Software

Programs designed to detect and remove malicious software.

18
New cards

Public Wi-Fi Risks

Using public Wi-Fi can expose sensitive activities to security threats.

19
New cards

Social Media Privacy

Adjusting privacy settings to protect personal information shared online.