Code-HS

Ace your homework & exams now with Quizwiz!

visualization data?

Using charts, Graph, or images to visualize complex data (Ex. A graph for students)

data limitations?

are what we can conclude from examining data and data visualizations.

"Public Domain"?

Creator has dedicated the work to the public domain and waived all rights.

What is not true about Cyber-Security?

Cyber attacks can devastate large organizations, but individuals are largely unaffected.

How to be an Upstander

Reach out to the victim of Cyberbully and Don't bully the person who is being bullied

"Rights Reserved"?

Creator Reserved all Rights (most strictest right/rules)

Felipe is trying to find information on wind power in Germany. Which of the following would be the most effective search query for this? (Search Engine)

"wind power" +Germany

What are some ways to collect data?

-Naturalistic Observation - Surveys/ questionnaires - Systematic observation -Archival Data

3 types of copyrights?

All right Reserved Some rights reserved Public Domain

Read the following scenario. Using complete sentences, explain which part of the CIA triad has been broken. Make sure to explain your answer. Cynthia is working on her college applications online, when the admissions website crashes. She is unable to turn in her college application on time.

Availability, (Your Reasons)

Read the following scenario. Using complete sentences, explain which part of the CIA triad has been broken. Make sure to explain your answer. Rob opens his fitness tracking app to start logging a workout. The app crashes, and he is unable to log his workout.

Availability, (Your Reasons)

What should you do online? (On the internet/social media)

Be wary when communicating with people you don't know in real life. Don't disclose personal information--even if it doesn't seem important. block/report if you are being harassed. Asked a trusted adult if you need more help.

Read the following scenario. Using complete sentences, explain which part of the CIA triad has been broken. Make sure to explain your answer. Kim takes her college admissions test and is waiting to get her results by email. By accident, Kim's results are sent to Karen

Confidentiality, (Your Reasons)

CIA triad?

Confidentiality, integrity, and availability. Which are the elements of the information system that each organization is trying to protect.

How do I keep my personal data secure and private?

Create a Strong Password containing 8-20 characters (With symbols) and a "2 factor authentication" which is basically extra security.

"Rights Reserved"?

Creator May allow for things like reuse or modifications as long as they are cited as the creator

What should you do when you're being cyberbullied?

Don't Respond to them Keep record of what he says to you Reach out to an trusted adult Block the bully

True or false: The internet is a great place to socialize, and because it is completely online, everyone is safe.

False

(True or False.)The information about a particular person that exists on the Internet is a result of only a portion of their online activity. Some things don't matter or are not part of a person's digital footprint.

False, (Your Reasons)

(True or False) By checking the box on a privacy policy page, a company can legally use your data and information in all the ways disclosed, no matter what.

False. It depends if the privacy policy allows you to opt in or out of sharing data.

"Gray Hat" hacker?

Hack Without permission--oftentimes illegally Once Vulnerabilities are found they will request payment.

"Black Hat" hacker?

Hacker that break into security network to destroy, modify, or steal data, ( It not legal and so their basically criminal )

(Consider the following) Suppose you want to make a visualization that shows how many students bought certain quantities of candy from the vending machine during the month of September. Of the choices below, which chart would best convey this information to the person looking at the graph?

Histogram

Read the following scenario. Using complete sentences, explain which part of the CIA triad has been broken. Make sure to explain your answer. Tony gets his phone bill in the mail. The bill was supposed to be for $80, but the mail person spilled water on the bill, smearing the ink. The bill now asks for $8.

Integrity, (Your Reasons)

Information Literacy?

Is having the ability to find information, evaluate information credibility, and use information effectively.

What can Victim experience from cyberbullying

Isolation low self esteem, and depression

"White Hat" hacker?

It basically a person who has permissions to hack a system hired to penetration testing (A legal job under government supervisions)

Consider things that you feel are best kept secret. If you really want to keep something secret, how do you about doing that? (In society)

Make sure you don't have an online present or by putting you social media to private.

Cyber

Meaning dealing with computers or computer network.

Security

Measure taken to guard against spying or destructive actions.

What does your Data Privacy need in a transparent society?

Need for security Personal security Organizational security

"OWASP" stand for?

Open Web Application Security Project

Confidentiality?

Protection of online information. Ex. Financial information, health records,and government documents.

Why is it important to follow copyright license rules?

So that people dont steal your creative ideas

Why is it important to learn about Cyber-security?

So we learn how to protect our information/data from being leaks.

You begin to receive direct messages on Instagram from a person you don't recognize. They claim to go to your school, and they know a lot of information about your classes and teachers. They also follow a lot of your classmates, so you believe them. After a bit, they start asking questions about you and your friends. What steps should you take to respond to this situation?

Talk to a friend to see if the same thing is happening to them too .After that if they don't know him then report him and block him/her.

(Consider the following) Andrea starts receiving messages and public posts on social media from a group of students. These posts accuse her of spreading rumors about another student, which she knows she didn't do. Everyday, she receives more messages and posts. (How should Andrea respond to this situation?)

Tell an adult or talk to them upfront

penetration testing? (For Hacking?)

Their testing your software to see what you need to protect your software before someone actually hacks in. (This is a legal "White Hat" Hackers who does this job.)

What should you do to limited your Digital Footprint?

Think before you post and Turn on Privacy settings.

"Right to be forgotten"?

To exercise the right to be forgotten and request removal from a search engine

Integrity?

ensuring that information is protected from unauthorized or unintentional alterations.

Availability

the assurance that systems and data are accessible by authorized users when and where needed.

copyright?

the exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same.

"Digital Footprint?"

the information about a particular person that exists on the Internet as a result of their online activity.

Cyber-security

the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.

cyberbullying?

the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.


Related study sets

Pathophysiology chapter 17 Control of Cardiovasvular Function

View Set

Chapter 3: Solving Problems by Searching

View Set

GCSE Computer Science: Unit 2.3 Robust Programs L1

View Set

Module 11: Wireless Network Security

View Set

EMT Chapter 17-19, 21 & 22 - Neurologic Emergencies, Gastrointestinal and Urologic Emergencies, Endocrine and Hematologic, Toxicology, Psychiatric Emergencies, EMT

View Set

Forensic Analysis/Restriction enzymes

View Set