Connect Module 5 Quiz

Ace your homework & exams now with Quizwiz!

radio frequency identification (RFID)

3 parts: antenna, transceiver, and transponder; inexpensive and doesnt require direct line of sight scanning

U.S. Internet privacy laws

Red Flags Rule, Children's Online Privacy Protection Act (COPPA) and Gramm-Leach-Bliley Act

antivirus software

a computer program that scans files to identify and remove computer viruses and other malicious programs

electronic data interchange

allows for the electronic communication of business-oriented transactions and information between people and organizations

script kiddies

amateur computer hackers with little programming expertise that illegally gain access to computer systems using programs (scripts) that others have written

DoS attack

attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests

on-going series of events

blackmail, cyberstalking

transceiver

both sends and receives information

black hat hacker

breaks into computer systems with the intent of causing damage or stealing data

internet filter

can be installed on a server, computer, or router

US-CERT

classifies the risks of online computer gaming into technological risks and social risks

transponder

comes in the form of an RFID tag (chip), can be programmed to contain a variety of information including pet ownership data, product identification, and package content

three C's

company, college, and colleagues

viruses

computer is running slower than usual, you cannot boot your computer

spam filter

computer software designed to prevent spam messages from entering into a user's email inbox; search for spam by monitoring suspicious work patterns and frequencies

third party cookies

created by a website other than the one you are currently visiting and are used to track your surfing habits

first party cookies

created by visiting websites to optimize browsing

branding

creating a name, symbol/design that allows consumers to identify and distinguish products and services from one another; derived from who they are, who they want to be, and who people perceive them to be

hacker

cyberterrorist, script kiddle, black hat, white hat

digital milennium copyright act (OMCA)

deals with digital copyright related issues (1998); implements 2 world intellectual property organization (WIPO) treaties- 4 titles

cyberattack

deliberate misuse of computers and networks via the internet; use malicious code to modify the normal operations of a computer of network

malware

designed to steal information, destroy data, incapacitate a computer or network, and fustrate the user; viruses, worms, trojan horses

Employee-monitoring software

designed to track and record the use of network and hardware resources in the workplace by employees; Web and internet filters

worm

destructive program that replicates itself through a single computer or across a network; automatically reproduces itself, designed to attack both wired and wireless networks, replication exhausts network bandwidth or available storage

firewalls

filter all info coming through the internet to your network or computer system

sixdegree.com

first social media site to allow users to create profiles, organize groups and invite friends; 1997

open educational resources (OER)

free openly licensed learning resources-available online, includes textbooks, assignments, digital media

creative commons

global nonprofit organization that empowers people to create open resource materials that can be shared or reused

botnet

group of compromised computers controlled by a hacker

hacktivism

hacking computer systems for a politically or socially motivated purpose

password management software

helps keep password safe, use strong password and never use same one twice- Dashline and LastPass

intellectual property

human knowledge and ideas that the law protects against unauthorized use by others; patents, trademarks, copyrights, trade secrets

packet filters

inspects each packet leaving or entering a network

proxy server

intercept all messages between clients and server

quarantine

isolated area on the hard drive where the infected file goes if the software cannot remove it

business software alliance

leading advocate against software piracy; operates in more than 60 countries; includes Apple, Microsoft, Adobe

fee based vs. free antivirus software

main difference is # of features; many fire antivirus programs come with advertising, most perform almost as effectively as their fee based counterparts

Federal Trade Commission (FTC)

main government agency responsible for internet privacy protection (both state and federal gov)

electronic funds transfer

online banking that uses computers in place of checks to transfer funds from one account to another

types of firewalls

packet filters and proxy server

cyberbully

person who harms/harasses via information technology and networks in a repeated and deliberate manner

types of cyberattacks

pharming/phishing, spamming/spoofing, spyware, trojans/viruses, identity/info theft, DoS and DDoS attacks

pharming

phishing that seeks to obtain personal information through malicious software that is inserted on a victim's computer; phony web page, try to get personal info

emoticons

pictures or graphics used in text and email messages (1982)

massive multiplayer online role playing games (MMORPG or MMO)

players create online identities and use them to participate in virtual games; supports large number of players in the same virtual world

online nuisance

pop ups start appearing after visiting unfamiliar sites, receiving a lot of spam emails + bounced back mail, and frequent pop ups while search the web/working in programs; spam, spoofing and spyware

network address translation

provides a type of firewall protection by hiding internal IP addresses; developed by Cisco and used by firewalls, routers and computers that are part of a network and connected to internet

email viruses

ransomware, keystroke-logging trojan, and malware

white hat hackets

safety shield employs computer experts who test the security measures of an organizations information systems to ensure they are protected against intrusions

mozilla/firefox

set time range to clear everything, click on arrow next to details to expand list of history items, select cookies and make sure that other items you want to keep arent selected, click clear now and close recent history window

managing cookies

settings in web browsers can delete cookies, block/customize cookies or allow cookies

trojan malware

similar to viruses, but do not replicate themselves, often found attached to free downloads and apps, often used to find passwords, destroy data, or bypass firewall

web cookie

small text file of information created by websites you visit that your web browser stores on your hard disk

persistent cookie

small text files stored on hard drive, collect info regarding user preferences, password/username info, IP address, data on web surfing behavior

digital identity

social media postings, online search activity, purchasing behavior

virus signature

software code of a particular computer virus

adware

software that collects a users web browsing history to create unsolicited targeted pop-up ads

spyware

software that collects information about your internet surfing habits and behaviors

packet sniffers

specialized hardware of software that capture packets transmitted over a network

online nuisances

spyware, adware, and spam

software theft

stealing software programs, illegally copying a program (piracy), intentionally erasing a program that doesnt belong to you, or illegally activating/registering a program

session cookie

stored in temporary memory and is lost when the browser is closed; determines start and end of a session, analyze and measure traffic on a web page, and determine the web browser being used

ergonomics

study of human interaction with the objects they use; refers to the interaction humans have with computers hardware devices and computer workstations, concerned with fitting the task to the user rather than fitting the user to the task; Greek derived ergon (work) and nomoi (natural law)

internet privacy

the right of personal privacy concerning the storing, distributing, and displaying information concerning oneself via the internet; international laws vary greatly; how the data is used, who has access to data, techniques, used to protect sensitive and private data, communications and preferences

antenna

transmits the signal via radio waves

phishing

trick users into revealing usernames and passwords by appearing legitimate- email messages from established organization

single event

trojan horse, keystroke logger, and phishing

bootkit

type of malware that hides in the operating system and is triggered each time you boot your computer; allows to install rogue files, use and take control of the computer by creating a "backdoor" that bypasses security and deletes files

spam

unsolicited email

personal websites

used to enhance a personal brand, includes schools attended, jobs, and extracurricular activities

cyberterrorist

uses computers and the internet to launch attacks against computer systems for political or ideological reasons; disruption of e-commerce and government sites, power grid and public utilities

macro virus

virus written in a macro language and placed within a document or spreadsheet

cookies risks

websites can collect your info and sell it to 3rd parties

ransomware

when activated, encrypts files on user hand drive and then sells a decryption program; makes a computer data inaccessible until a ransom payment is made; threatening

keystroke-logging trojan

when activated, saves all keystrokes for subsequent transmission to virus creator

software piracy

when copyrighted software is illegally copied, distributed, modified, or sold, and is considered copyright infringement

six degrees of separation

you can connect with anyone through a chain of no more than 5 introductions or personal links


Related study sets

ECON 2411 CH. 9 Central Banks and The Federal Reserve System

View Set

Kohlberg's levels and stages of moral development

View Set

Chapter 7 Organizational Planning

View Set

You are now Entering the Human Heart

View Set