IT Fundamentals - Chapter 30

¡Supera tus tareas y exámenes ahora con Quizwiz!

Expectation of privacy

A legal test used in the USA to determine how the US Constitution protections against unreasonable search apply to a issues of privacy.

VPN (virtual private network)

A way of connecting to the network that allows for a secure private connection over a public network, using an encrypted 'tunnel'.

Metadata

Data that describes other data. Some of this information can be personally identifiable information that should be removed.

Personally identifiable information (PII)

Data that identifies a person, including a Social Security number, email address, physical address, birthdate, birth place, phone numbers, and biometric data.

Customer information

Information held by an organization about its current, former, and prospective customers, including contact information, address, phone numbers, email addresses, purchasing history, current proposals.

Company confidential information

Information that a business uses to conduct its business, such as trade secrets, processes, sales, purchases, customer lists, accounting data and more.

Apple Pay

Mobile payments service and digital wallet app from Apple that utilizes Near Field Communication (NFC) to initiate secure payment transactions.

Google Pay

Mobile payments service and digital wallet app from Google that utilizes Near Field Communication (NFC) to initiate secure payment transactions.

Cookies

Small text files that are sent to your computer from certain websites. They track your behavior and can be used by malware to send your browsing history to hackers.

Permissions

The access level assigned to a folder or file and given to a user account or user group. Access can include full control, write and read-only.

Peer-to-peer file sharing

The online sharing of music or other files directly from individual computer users' hard drives, rather than through posting the files on central servers. It is often used for illegal downloads.

Single-use credit card

Virtual credit card that can be used for more secure online shopping.

Social networking sites

Websites such as Facebook and Twitter on which users can create content, share ideas, and interact with friends. Content posted on social media can be viewed, read and shared by others, so there is no legal expectation of privacy.


Conjuntos de estudio relacionados

Chapter 6 Osseous Tissue and Bone Structure

View Set

Chapter 2: Collecting Subjective Data: The Interview and Health History PrepU

View Set

Unit 3: Circular Motion & Gravitation

View Set

Unit 1 - A new look - 1.4 Reading

View Set