MindTap Module 6: Security and Safety
technology addiction
A behavioral hazard that occurs when a user is obsessed with using a technology device and cannot walk away from it without feeling extreme anxiety.
social engineering
A category of attacks that attempts to trick the victim into giving valuable information to the attacker. At its core, social engineering relies on an attacker's clever manipulation of human nature in order to persuade the victim to provide information or take actions.
worm
A collection of harmful computer code that spreads throughout a computer and/or network without requiring user interaction.
hoax
A false warning, often contained in an email message that pretends to come from a valid source like the company's IT department. Attackers use this method to break into computers.
two factor authentication (2FA)
A method that combines multiple types of authentication to increase security. This is most often used with passwords (something you know) and the approved user having a specific item in his possession (something you have) that no one else would have. This is commonly used by combining passwords and codes sent to a cell phone using a text message.
encryption
A security method of "scrambling" information as it is transmitted over a network. Information is scrambled in such a way that it cannot be read unless the user possesses the "key" to unlock it back to a readable format.
ransomware
A type of malware that prevents a user's device from properly and fully functioning until a fee is paid. The ransomware embeds itself onto the computer in such a way that it cannot be bypassed, even by rebooting.
biometric security
A way to verify your identity based on physical characteristics.
repetitive strain injury (RSI)
Aches and pains associated with repeated and long-term usage of the devices.
cyberbullying
Bullying that takes place on technology devices like cell phones, computers, and tablets using online social media platforms, public online forums, gaming sites, text messaging, or email. Cyberbullying includes sending, posting, or sharing negative, harmful, mean-spirited, and usually false content about another person.
digital certificate
Code attached to a file that verifies the identity of the creator of the file.
e-waste
Electronic waste from discarded digital devices. It often contains toxic metals such as lead and mercury.
phishing
In Computer Concepts, sending an email or displaying a web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into giving private information.
malware
Malicious software, such as viruses and spyware, that can delete or corrupt files and gather personal information.
Trojan
Malware that hides inside another program, often one downloaded from the web.
data backup
The process of copying files from a computer's hard drive to be stored in a remote location.
authentication
The process of ensuring that the person requesting access to a computer or other resources is authentic, and not an imposter.
data mining
The process of sifting through big data to find the important questions that will yield fruitful results.
decryption
The process of unlocking encrypted information back into a readable format.
spam
Unwanted email messages sent from an unknown sender to many email accounts, usually advertising a product or service such as low-cost medication, low-interest loans, or free credit reports; also called junk mail or junk email.
identity theft
Using someone's personal information, such as their name, Social Security number, or credit card number, to commit financial fraud.