Explore
Login
Register
/
CCC1002
Clone
Register
Report Bug
CCC1002
Flashcard Deck
Study
Big Data
The ever growing volume of data collected about us is often referred to as big data.
Information Resellers
Information resellers or information brokers collect and sell personal data.
Mistaken Identity
Mistaken identity occurs when the digital footprint of one person is switched with another.
Freedom of Information Act
The Freedom of Information Act entitles individuals access to governmental records relating to them.
Private Networks
Many organizations monitor employee email and computer files using special software called employee monitoring software.
The Internet and the Web
Many people believe that while using the web little can be done to invade their privacy. This is called the illusion of anonymity.
Deep Web
The deep web is comprised of websites that are hidden from standard search engines and provide secure and anonymous communication.
Dark Web
The dark web is a part of the deep web comprised of sites that use special software to hide their IP addresses making it nearly impossible to identify who is using it.
Browser Data
Information stored by browsers includes history files (record of sites visited) and temporary internet files or browser cache (contain website content and display instructions) and cookies (store and track information).
Privacy Mode
Private browsing ensures that your browsing activity is not recorded.
Spyware
Spyware secretly records and reports Internet activities.
Keyloggers
One type of computer monitoring software records every activity and keystroke.
Online Identity
Many people post personal information and sometimes intimate details of their lives without considering the consequences. This creates an online identity.
Major Laws on Privacy
The Gramm Leach Bliley Act protects personal financial information, the Health Insurance Portability and Accountability Act (HIPAA) protects medical records, and the Family Educational Rights and Privacy Act (FERPA) restricts disclosure of educational records.
Computer Security Risk
A computer security risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing.
What is a computer security risk?
A computer security risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability.
What are some examples of intentional computer security breaches?
Some intentional breaches include accessing data or programs on a computer, leaving a message to indicate presence, and deliberately altering or damaging data.
What does computer security focus on protecting?
Computer security focuses on protecting information, hardware, and software from unauthorized use, as well as preventing damage from intrusions, sabotage, and natural disasters.
What is an intentional breach of computer security often referred to as?
An intentional breach of computer security is often referred to as a computer crime.
What is cybercrime?
Cybercrime (computer crime) is a criminal offense involving a computer or network.
What is cyberterrorism?
Cyberterrorism is politically motivated cybercrime.
What are some types of cybercrime?
Identity theft, internet scams, data manipulation, ransomware, denial of service (DOS) attack, and distributed denial of service (DDOS) attack.
What are the seven basic categories of cybercrime and intrusion perpetrators?
Hacker, cracker, script kiddie, corporate spy, unethical employee, cyberextortionist, and cyberterrorist.
What does the term 'hacker' refer to in the context of cybercrime?
Originally a complimentary word for a computer enthusiast, now has a derogatory meaning and refers to someone who accesses a computer or network illegally.
What is the intent of a hacker's security breaches?
Some hackers claim the intent of their security breaches is to improve security.
What is a 'cracker' in the context of cybercrime?
Someone who accesses a computer or network illegally with the intent of destroying data, stealing information, or other malicious actions.
What are the skills and knowledge of hackers and crackers?
Both hackers and crackers have advanced computer and network skills.
What is a 'script kiddie' in the context of cybercrime?
A script kiddie has the same intent as a cracker but does not have the technical skills and knowledge. They often use prewritten hacking and cracking programs to break into computers.
What is the role of corporate spies in cybercrime?
Some corporate spies have excellent computer and networking skills and are hired to break into a specific computer and steal its proprietary data and information or to help identify security risks in their own organization.
What is corporate espionage?
Unscrupulous companies hire corporate spies (a practice known as corporate espionage) to gain a competitive advantage.