IT SECURITY ISSUES

0.0(0)
studied byStudied by 3 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/7

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

8 Terms

1
New cards
Online Communication
It refers to how people and computers communicate with each other through a network and the internet. These types are instant messaging, emails, online forums, filling out online forms, posting comments on social media or blogs, social networking, or online conferencing.
2
New cards
Public activities
Many online activities are open for public use. Engaging in these sorts of activities doesn’t normally create an expectation of privacy. In fact, consistent with the ECPA, it’s not illegal for anyone to look at or disclose a transmission if the communication is “readily accessible” to the public.
3
New cards
Semi-private activities
Often, the presence of agreement or security safeguards on certain forums can lead users to believe that communications made within these services are private. For instance, some online forums or comment sections are restricted to users who are authorized/with a password. While communications made in these forums may originally be read-only by the members with access, there’s nobody preventing those members from recording the communications and later transmitting them elsewhere.
4
New cards
Private activities
Almost all online services offer “private” activity, which allows subscribers to send personal email messages to others. The ECPA makes it unlawful for anyone to read or disclose the contents of a transmission.
5
New cards
Web bugs
It could be a graphic associate exceedingly in an internet site or an enhanced email message that permits the 3rd party to watch who is reading the page or message. The graphic could also be a typical size image that’s simply seen, or it may be a virtually invisible one-pixel graphic. Email messages that embrace graphic displays like websites are called increased messages, conjointly known as stylized or HTML e-mail.
6
New cards
Encryption
A technique of scrambling email message or file in an order that it’s meaningless to anyone who doesn’t apprehend how to unscramble it. The advantage of it is it is just about inaccessible to anyone except the selected recipient.
7
New cards
Pretty Good Privacy
___ and different encryption programs will protect a user’s privacy by encrypting the knowledge; thus, the solely supposed recipient will access it and know it. Sturdy encryption programs corresponding to PGP are on the market online.
8
New cards
Netiquette
It is a set of social agreements that facilitate interaction over networks. It is short for “network etiquette” or “Internet etiquette”. It includes correct manners for sending that provide rules of conduct in social things. The aim of it is to assist, construct, and maintain a pleasing, comfy, and economic atmosphere for online communication, additionally on avoid inserting strain on the system and generating conflict among users