Connect Module 5 Quiz
radio frequency identification (RFID)
3 parts: antenna, transceiver, and transponder; inexpensive and doesnt require direct line of sight scanning
U.S. Internet privacy laws
Red Flags Rule, Children's Online Privacy Protection Act (COPPA) and Gramm-Leach-Bliley Act
antivirus software
a computer program that scans files to identify and remove computer viruses and other malicious programs
electronic data interchange
allows for the electronic communication of business-oriented transactions and information between people and organizations
script kiddies
amateur computer hackers with little programming expertise that illegally gain access to computer systems using programs (scripts) that others have written
DoS attack
attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests
on-going series of events
blackmail, cyberstalking
transceiver
both sends and receives information
black hat hacker
breaks into computer systems with the intent of causing damage or stealing data
internet filter
can be installed on a server, computer, or router
US-CERT
classifies the risks of online computer gaming into technological risks and social risks
transponder
comes in the form of an RFID tag (chip), can be programmed to contain a variety of information including pet ownership data, product identification, and package content
three C's
company, college, and colleagues
viruses
computer is running slower than usual, you cannot boot your computer
spam filter
computer software designed to prevent spam messages from entering into a user's email inbox; search for spam by monitoring suspicious work patterns and frequencies
third party cookies
created by a website other than the one you are currently visiting and are used to track your surfing habits
first party cookies
created by visiting websites to optimize browsing
branding
creating a name, symbol/design that allows consumers to identify and distinguish products and services from one another; derived from who they are, who they want to be, and who people perceive them to be
hacker
cyberterrorist, script kiddle, black hat, white hat
digital milennium copyright act (OMCA)
deals with digital copyright related issues (1998); implements 2 world intellectual property organization (WIPO) treaties- 4 titles
cyberattack
deliberate misuse of computers and networks via the internet; use malicious code to modify the normal operations of a computer of network
malware
designed to steal information, destroy data, incapacitate a computer or network, and fustrate the user; viruses, worms, trojan horses
Employee-monitoring software
designed to track and record the use of network and hardware resources in the workplace by employees; Web and internet filters
worm
destructive program that replicates itself through a single computer or across a network; automatically reproduces itself, designed to attack both wired and wireless networks, replication exhausts network bandwidth or available storage
firewalls
filter all info coming through the internet to your network or computer system
sixdegree.com
first social media site to allow users to create profiles, organize groups and invite friends; 1997
open educational resources (OER)
free openly licensed learning resources-available online, includes textbooks, assignments, digital media
creative commons
global nonprofit organization that empowers people to create open resource materials that can be shared or reused
botnet
group of compromised computers controlled by a hacker
hacktivism
hacking computer systems for a politically or socially motivated purpose
password management software
helps keep password safe, use strong password and never use same one twice- Dashline and LastPass
intellectual property
human knowledge and ideas that the law protects against unauthorized use by others; patents, trademarks, copyrights, trade secrets
packet filters
inspects each packet leaving or entering a network
proxy server
intercept all messages between clients and server
quarantine
isolated area on the hard drive where the infected file goes if the software cannot remove it
business software alliance
leading advocate against software piracy; operates in more than 60 countries; includes Apple, Microsoft, Adobe
fee based vs. free antivirus software
main difference is # of features; many fire antivirus programs come with advertising, most perform almost as effectively as their fee based counterparts
Federal Trade Commission (FTC)
main government agency responsible for internet privacy protection (both state and federal gov)
electronic funds transfer
online banking that uses computers in place of checks to transfer funds from one account to another
types of firewalls
packet filters and proxy server
cyberbully
person who harms/harasses via information technology and networks in a repeated and deliberate manner
types of cyberattacks
pharming/phishing, spamming/spoofing, spyware, trojans/viruses, identity/info theft, DoS and DDoS attacks
pharming
phishing that seeks to obtain personal information through malicious software that is inserted on a victim's computer; phony web page, try to get personal info
emoticons
pictures or graphics used in text and email messages (1982)
massive multiplayer online role playing games (MMORPG or MMO)
players create online identities and use them to participate in virtual games; supports large number of players in the same virtual world
online nuisance
pop ups start appearing after visiting unfamiliar sites, receiving a lot of spam emails + bounced back mail, and frequent pop ups while search the web/working in programs; spam, spoofing and spyware
network address translation
provides a type of firewall protection by hiding internal IP addresses; developed by Cisco and used by firewalls, routers and computers that are part of a network and connected to internet
email viruses
ransomware, keystroke-logging trojan, and malware
white hat hackets
safety shield employs computer experts who test the security measures of an organizations information systems to ensure they are protected against intrusions
mozilla/firefox
set time range to clear everything, click on arrow next to details to expand list of history items, select cookies and make sure that other items you want to keep arent selected, click clear now and close recent history window
managing cookies
settings in web browsers can delete cookies, block/customize cookies or allow cookies
trojan malware
similar to viruses, but do not replicate themselves, often found attached to free downloads and apps, often used to find passwords, destroy data, or bypass firewall
web cookie
small text file of information created by websites you visit that your web browser stores on your hard disk
persistent cookie
small text files stored on hard drive, collect info regarding user preferences, password/username info, IP address, data on web surfing behavior
digital identity
social media postings, online search activity, purchasing behavior
virus signature
software code of a particular computer virus
adware
software that collects a users web browsing history to create unsolicited targeted pop-up ads
spyware
software that collects information about your internet surfing habits and behaviors
packet sniffers
specialized hardware of software that capture packets transmitted over a network
online nuisances
spyware, adware, and spam
software theft
stealing software programs, illegally copying a program (piracy), intentionally erasing a program that doesnt belong to you, or illegally activating/registering a program
session cookie
stored in temporary memory and is lost when the browser is closed; determines start and end of a session, analyze and measure traffic on a web page, and determine the web browser being used
ergonomics
study of human interaction with the objects they use; refers to the interaction humans have with computers hardware devices and computer workstations, concerned with fitting the task to the user rather than fitting the user to the task; Greek derived ergon (work) and nomoi (natural law)
internet privacy
the right of personal privacy concerning the storing, distributing, and displaying information concerning oneself via the internet; international laws vary greatly; how the data is used, who has access to data, techniques, used to protect sensitive and private data, communications and preferences
antenna
transmits the signal via radio waves
phishing
trick users into revealing usernames and passwords by appearing legitimate- email messages from established organization
single event
trojan horse, keystroke logger, and phishing
bootkit
type of malware that hides in the operating system and is triggered each time you boot your computer; allows to install rogue files, use and take control of the computer by creating a "backdoor" that bypasses security and deletes files
spam
unsolicited email
personal websites
used to enhance a personal brand, includes schools attended, jobs, and extracurricular activities
cyberterrorist
uses computers and the internet to launch attacks against computer systems for political or ideological reasons; disruption of e-commerce and government sites, power grid and public utilities
macro virus
virus written in a macro language and placed within a document or spreadsheet
cookies risks
websites can collect your info and sell it to 3rd parties
ransomware
when activated, encrypts files on user hand drive and then sells a decryption program; makes a computer data inaccessible until a ransom payment is made; threatening
keystroke-logging trojan
when activated, saves all keystrokes for subsequent transmission to virus creator
software piracy
when copyrighted software is illegally copied, distributed, modified, or sold, and is considered copyright infringement
six degrees of separation
you can connect with anyone through a chain of no more than 5 introductions or personal links