ch 5 and 6 concept
asynchronous
Type of communication, such as blogging, where authors and readers do not need to be online at the same time
Black Hat
Type of hacker who intends serious harm through espionage, theft, or disruption of a network
White Hat
Type of hacker who wants to show off their skills and doesn't intend any serious damage
spyware
Type of malware that collects bits of data, like your surfing habits
virus
Type of malware that is spread when you distribute infected files, especially as e-mail attachments
Worm
Type of malware that spreads without human interaction, sending itself out to everyone in your address book
uninterruptible
Type of power supply/battery backup device that can prevent some forms of data loss
misspelled company name
indication that a web site is not secure
https://
indication that a web site is secure for shopping
hurricanes and storms
Events that account for almost half of total catastrophic data losses
General search
engine that searches web pages in its database that contain specific words or phrases
WPA2
A high level of encryption for wireless devices
Netiquette
A set of online communication practices and rules
piggybacking
A slowed down Wi-Fi connection can be the result of this
J0$e186#nk
A strong password
username
A unique name you create to identify yourself to a computer system
email forwarding
C2C web sites typically use this to connect buyers with sellers and still protect everybodys privacy
Malware
Common forms include computer viruses, Trojan horses, and worms
Bot
Computer taken over by hackers to perform malicious tasks across a network
Components of an online profile
Details about an individual that are combined from online and offline behaviors, including comments, postings, likes and shares, and online coupons
adware
Displays unsolicited advertisements in banners or pop-up windows
Adware
Displays unwanted advertisements in banners or pop-up windows on your computer
phishing
Emails that might appear to come from your bank or credit card company, asking you for email logon or personal information
social search tool
Finds subjective content, such as comments, reviews, and opinions
Report abuse quickly
First step to take when being cyberbullied or cyberstalked
source
If youre sending an email message from your laptop to a classmate, the laptop is the
Drivers license, birth certificate
Items an identity thief can obtain to impersonate you
authentication
Method used to verify the identity of computer users
Recycle Bin
Not emptying this lets files remain on your computer and take up space
money transfer
Online payment method to avoid
Disk cleanup utility
Removes unused files like temporary Internet files from your hard drive
disk defragment
Reorganizes the data on a magnetic hard drive so that you can access files more quickly
phishing
Scam that looks like a genuine message or Web site, but tries to get you to reveal sensitive information
Firewall
Security feature often built into operating systems
Spyware
Software secrectly installed on networked computers that tracks and transmits personal data without your knowledge or permission
virus protection
Software that scans incoming messages and programs to protect your computer
Identity theft
The nations fastest growing crime, where victims are unaware its being committed until the damage is done
Cookie
Used by commercial Web site vendors to identify users and customize Web pages
cyberterrorism
Using automated attack tools like viruses and worms to deliberately disrupt computers and networks to affect the most people
World wide web
a collection of millions of web sites
web site
a collection of related web pages connected by hyperlinks
web page
a hypertext markup language (HTML) documant
Tweet
a post to a microblog such as twitter
SET
a standard protocol for securing credit card transactions over the internet
wiki
a type of web page that a group of people can comment on and make changes to
blog
a web page listing jornal entries that provide commentary and information, usually about a particular interest
text messaging
another term for SMS, messages of less than 160 characters sent via a cellular netowkr
advertising
e commerce sites sell this to generate income
B2C
e-commerce model where businesses provide goods and services to individuals
specialty search
engine that provides access to academic information for research
wiki
is a collaboraitive website that people use to communicate with each other
social network
is a web site where members share interests, ideas, and information
podcast
is an audio file distributed through downloads or feeds
Blog
is an informal website of time stamped articles written in journal format
citizen journalist
members of the public who report on current events
click through
occurs when you click a pop up or banner advertisement on a web site and go to the advertisers web site
metasearch engine
offers the convenience of searching many sources from one web site
electronic wallet
one secure method of online payment
online reference
service that connects you with a human librarian
mosaic
the first graphical web browser released in 1993