MindTap Module 6: Security and Safety

Ace your homework & exams now with Quizwiz!

technology addiction

A behavioral hazard that occurs when a user is obsessed with using a technology device and cannot walk away from it without feeling extreme anxiety.

social engineering

A category of attacks that attempts to trick the victim into giving valuable information to the attacker. At its core, social engineering relies on an attacker's clever manipulation of human nature in order to persuade the victim to provide information or take actions.

worm

A collection of harmful computer code that spreads throughout a computer and/or network without requiring user interaction.

hoax

A false warning, often contained in an email message that pretends to come from a valid source like the company's IT department. Attackers use this method to break into computers.

two factor authentication (2FA)

A method that combines multiple types of authentication to increase security. This is most often used with passwords (something you know) and the approved user having a specific item in his possession (something you have) that no one else would have. This is commonly used by combining passwords and codes sent to a cell phone using a text message.

encryption

A security method of "scrambling" information as it is transmitted over a network. Information is scrambled in such a way that it cannot be read unless the user possesses the "key" to unlock it back to a readable format.

ransomware

A type of malware that prevents a user's device from properly and fully functioning until a fee is paid. The ransomware embeds itself onto the computer in such a way that it cannot be bypassed, even by rebooting.

biometric security

A way to verify your identity based on physical characteristics.

repetitive strain injury (RSI)

Aches and pains associated with repeated and long-term usage of the devices.

cyberbullying

Bullying that takes place on technology devices like cell phones, computers, and tablets using online social media platforms, public online forums, gaming sites, text messaging, or email. Cyberbullying includes sending, posting, or sharing negative, harmful, mean-spirited, and usually false content about another person.

digital certificate

Code attached to a file that verifies the identity of the creator of the file.

e-waste

Electronic waste from discarded digital devices. It often contains toxic metals such as lead and mercury.

phishing

In Computer Concepts, sending an email or displaying a web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into giving private information.

malware

Malicious software, such as viruses and spyware, that can delete or corrupt files and gather personal information.

Trojan

Malware that hides inside another program, often one downloaded from the web.

data backup

The process of copying files from a computer's hard drive to be stored in a remote location.

authentication

The process of ensuring that the person requesting access to a computer or other resources is authentic, and not an imposter.

data mining

The process of sifting through big data to find the important questions that will yield fruitful results.

decryption

The process of unlocking encrypted information back into a readable format.

spam

Unwanted email messages sent from an unknown sender to many email accounts, usually advertising a product or service such as low-cost medication, low-interest loans, or free credit reports; also called junk mail or junk email.

identity theft

Using someone's personal information, such as their name, Social Security number, or credit card number, to commit financial fraud.


Related study sets

Pain Management During labor and Birth

View Set

AP U.S. History The Constitution and Ratification

View Set

Activity 2-2 Television Production Staff and Crew

View Set

Personal Finance: Chapter 5 Section 3- Cash-Flow your College Education

View Set

Texas Statutes and Rules Pertinent to Life Insurance Only

View Set

Principles of Management Midterm Exam

View Set

Assignment - 9. Cost of Conflict

View Set