Compsci316 full-course

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/412

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

413 Terms

1
New cards

Data Privacy

The practice of protecting personal information from unauthorized access and misuse in the digital world.

2
New cards

Privacy Enhancing Technologies (PETs)

Technologies that allow the use of personal data while simultaneously protecting the privacy of individuals.

3
New cards

Anonymization

The process of removing identifiable information from data sets, making it impossible to link data back to an individual.

4
New cards

Pseudonymization

A data protection technique that replaces direct identifiers with fake identifiers while maintaining a link to the original data through a mapping table.

5
New cards

K-Anonymity

A method of anonymization that ensures each individual in a dataset cannot be distinguished from at least k-1 others, thus hiding them in a group.

6
New cards

Quasi Identifiers

Attributes that are not direct identifiers but can be combined with other data to identify an individual (e.g., age, zip code).

7
New cards

Differential Privacy

A technique that adds noise to data to protect individual privacy while allowing for aggregate analysis without revealing personal information.

8
New cards

Federated Learning

A decentralized approach to machine learning where models are trained locally on devices without transferring personal data to a central server.

9
New cards

Homomorphic Encryption

A form of encryption that allows computations to be performed on encrypted data without needing to decrypt it first.

10
New cards

Zero Knowledge Proof

A cryptographic method that allows one party to prove to another that they know a value without revealing the value itself.

11
New cards

Synthetic Data

Artificially generated data that mimics real data patterns, used for training machine learning models without compromising privacy.

12
New cards

GDPR (General Data Protection Regulation)

A comprehensive data protection law in the EU that governs how personal data is collected, processed, and stored.

13
New cards

Privacy by Design

An approach that integrates privacy considerations into the development of technologies and systems from the outset.

14
New cards

Noise Addition

The process of introducing random data to a dataset to obscure the original data and protect individual privacy.

15
New cards
16
New cards
17
New cards
18
New cards
19
New cards

Data Privacy

The practice of protecting personal information from unauthorized access and misuse in the digital world.

20
New cards

Privacy Enhancing Technologies (PETs)

Technologies that allow the use of personal data while simultaneously protecting the privacy of individuals.

21
New cards

Anonymization

The process of removing identifiable information from data sets, making it impossible to link data back to an individual.

22
New cards

Pseudonymization

A data protection technique that replaces direct identifiers with fake identifiers while maintaining a link to the original data through a mapping table.

23
New cards

K-Anonymity

A method of anonymization that ensures each individual in a dataset cannot be distinguished from at least k-1 others, thus hiding them in a group.

24
New cards

Quasi Identifiers

Attributes that, when combined with other data, can potentially identify an individual, such as age, gender, or zip code.

25
New cards

Differential Privacy

A technique that adds noise to data to protect individual privacy while allowing for aggregate analysis without revealing personal information.

26
New cards

Federated Learning

A decentralized approach to machine learning where models are trained locally on devices without transferring personal data to a central server.

27
New cards

Homomorphic Encryption

A form of encryption that allows computations to be performed on encrypted data without needing to decrypt it first.

28
New cards

Zero Knowledge Proof

A cryptographic method that allows one party to prove to another that they know a value without revealing the value itself.

29
New cards

Synthetic Data

Artificially generated data that mimics real data patterns, used for training machine learning models without compromising privacy.

30
New cards

GDPR (General Data Protection Regulation)

A comprehensive data protection law in the EU that governs how personal data is collected, processed, and stored.

31
New cards

Privacy by Design

An approach that integrates privacy considerations into the development of technologies and systems from the outset.

32
New cards

Noise Addition

The process of introducing random data to a dataset to obscure individual entries and protect privacy.

33
New cards
34
New cards
35
New cards
36
New cards
37
New cards

Privacy

The right of individuals to control their personal information and protect it from unauthorized access or disclosure.

38
New cards

Data Breach

An incident where unauthorized access to sensitive data occurs, potentially leading to the exposure of personal information.

39
New cards

GDPR

General Data Protection Regulation, a comprehensive data protection law in the European Union that governs how personal data is handled.

40
New cards

Personal Data

Any information that relates to an identified or identifiable natural person, including names, identification numbers, and location data.

41
New cards

Data Protection Regulations

Laws and guidelines established to protect personal data and ensure privacy rights for individuals.

42
New cards

Metadata

Data that provides information about other data, such as the time and duration of a phone call, often collected without the user's knowledge.

43
New cards

Dark Patterns

User interface designs that trick users into making choices that they might not otherwise make, often related to data sharing.

44
New cards

Data Footprint

The trail of data that individuals leave behind through their online activities, which can be tracked and analyzed.

45
New cards

Informed Consent

The process of obtaining permission from individuals before collecting or using their personal data, ensuring they understand how their data will be used.

46
New cards

Threat Modeling

A process used to identify and assess potential threats to data privacy and security during the development of a product or system.

47
New cards

Non-repudiation

A principle that ensures a person cannot deny the validity of their actions or data, particularly in the context of data sharing and privacy.

48
New cards

Privacy by Design

An approach that integrates privacy considerations into the development of products and services from the outset.

49
New cards

Data Minimization

The practice of limiting data collection to only what is necessary for a specific purpose, reducing the risk of data breaches.

50
New cards

Anonymization

The process of removing personally identifiable information from data sets, making it impossible to identify individuals.

51
New cards

Privacy

A topic often ignored in software development, focusing on the protection of personal information and data.

52
New cards

Fake name

A dummy name that students are required to enter for anonymity during the icebreaker session.

53
New cards

Group assignment

A collaborative task where students are encouraged to form groups of 5 or 6 members for their coursework.

54
New cards
55
New cards

Attack Vectors

Methods or pathways through which an attacker can gain access to a system or network.

56
New cards

Race Attack

A type of attack where two transactions compete to be confirmed, potentially leading to double spending.

57
New cards

Fire Attack

An attack similar to a race attack, where the attacker makes transactions without broadcasting them immediately.

58
New cards

51% Attack

An attack where a miner or group of miners controls more than 50% of the network's hashing power, allowing them to manipulate the blockchain.

59
New cards

Proof of Work

A consensus model where miners compete to solve complex mathematical problems to validate transactions and create new blocks.

60
New cards

Proof of Stake

A consensus model where validators stake their assets to be randomly selected to create and publish the next block, without solving puzzles.

61
New cards

Round Robin

A consensus model where publishing nodes take turns creating blocks, suitable for private or permissioned blockchains.

62
New cards

Denial of Service (DoS) Attack

An attack that prevents or impairs the authorized use of network systems or applications by exhausting resources.

63
New cards

Distributed Denial of Service (DDoS) Attack

A type of DoS attack that uses multiple systems to flood a target with traffic, overwhelming its resources.

64
New cards

Network Bandwidth

The capacity of the network links connecting a server to the internet, which can be targeted in DoS attacks.

65
New cards

System Resources

The limited resources available on a system, such as CPU and memory, which can be overloaded in DoS attacks.

66
New cards

Application Resources

Specific resources of applications, such as web servers or databases, that can be targeted to disrupt services.

67
New cards

CyberSLAM

An attack that targets application resources by generating resource-heavy requests to overload a server.

68
New cards

Ping of Death

A type of attack that sends oversized packets to crash a system.

69
New cards

Teardrop Attack

An attack that exploits vulnerabilities in older operating systems by sending fragmented packets that the system cannot reassemble.

70
New cards

Source Address Spoofing

A technique where an attacker falsifies the source IP address of packets to hide their identity.

71
New cards

Random Spoofing

A method of source address spoofing where the attacker uses random IP addresses to obscure their identity.

72
New cards

Softness Spoofing

A spoofing technique where the source address is random but within the same subnet as the target.

73
New cards

Fixed Spoofing

A method where a single, fixed IP address is used to make the traffic appear legitimate.

74
New cards

NIST

The National Institute of Standards and Technology, which provides definitions and guidelines related to cybersecurity.

75
New cards

Hacktivist

An activist who uses hacking to promote political agendas or social change, often through DDoS attacks.

76
New cards

Cyber Warfare

State-sponsored cyber attacks aimed at disrupting or damaging another nation's critical infrastructure.

77
New cards

Memory Pool

A collection of unconfirmed transactions in a blockchain network, which can be visualized for better understanding.

78
New cards
79
New cards
80
New cards
81
New cards
82
New cards
83
New cards
84
New cards
85
New cards
86
New cards
87
New cards

Network Security

A field focused on protecting computer networks from threats, including unauthorized access and attacks.

88
New cards

Network Anonymity

The practice of concealing the identities of the sender and receiver in network communications to protect privacy.

89
New cards

Intrusion Detection System (IDS)

A system that monitors network traffic for suspicious activity and potential threats.

90
New cards

Intrusion Prevention System (IPS)

A system that actively prevents detected threats from causing harm to the network.

91
New cards

Firewall

A network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

92
New cards

Internet of Things (IoT)

A network of interconnected devices that communicate and exchange data over the internet.

93
New cards

Cloud Security

The set of policies, technologies, and controls designed to protect data, applications, and infrastructures involved in cloud computing.

94
New cards

Blockchain

A decentralized digital ledger technology that records transactions across many computers securely and transparently.

95
New cards

K-Anonymity

A privacy concept that ensures an individual's data cannot be distinguished from at least K other individuals' data, enhancing anonymity.

96
New cards

Differential Privacy

A technique that adds noise to data to protect individual privacy while allowing for useful data analysis.

97
New cards

Whistleblower

An individual who exposes information or activity within an organization that is deemed illegal, unethical, or not correct.

98
New cards

Edward Snowden

A former NSA contractor who leaked classified information about government surveillance programs, highlighting issues of privacy and security.

99
New cards

Tails

A live operating system that can be started on almost any computer from a USB stick or a DVD, designed for privacy and anonymity.

100
New cards

Tor

The Onion Router, a free software for enabling anonymous communication on the internet by routing traffic through a network of volunteer-operated servers.