Duplicate
Export
Register
CCC1002
1 Flashcard Deck
Send to Chat
AI Edit
Heading 3
Highlight
Here's your flashcard deck!
Send to Chat
AI Edit
Normal Text
Highlight
You can edit it by clicking the 'edit'! Once you have a few cards, you can begin to study it in full screen or use our AI study mode!
Flashcard Deck
Study
Big Data
The ever growing volume of data collected about us is often referred to as big data.
Information Resellers
Information resellers or information brokers collect and sell personal data.
Mistaken Identity
Mistaken identity occurs when the digital footprint of one person is switched with another.
Freedom of Information Act
The Freedom of Information Act entitles individuals access to governmental records relating to them.
Private Networks
Many organizations monitor employee email and computer files using special software called employee monitoring software.
The Internet and the Web
Many people believe that while using the web little can be done to invade their privacy. This is called the illusion of anonymity.
Deep Web
The deep web is comprised of websites that are hidden from standard search engines and provide secure and anonymous communication.
Dark Web
The dark web is a part of the deep web comprised of sites that use special software to hide their IP addresses making it nearly impossible to identify who is using it.
Browser Data
Information stored by browsers includes history files (record of sites visited) and temporary internet files or browser cache (contain website content and display instructions) and cookies (store and track information).
Privacy Mode
Private browsing ensures that your browsing activity is not recorded.
Spyware
Spyware secretly records and reports Internet activities.
Keyloggers
One type of computer monitoring software records every activity and keystroke.
Online Identity
Many people post personal information and sometimes intimate details of their lives without considering the consequences. This creates an online identity.
Major Laws on Privacy
The Gramm Leach Bliley Act protects personal financial information, the Health Insurance Portability and Accountability Act (HIPAA) protects medical records, and the Family Educational Rights and Privacy Act (FERPA) restricts disclosure of educational records.
Computer Security Risk
A computer security risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing.
What is a computer security risk?
A computer security risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability.
What are some examples of intentional computer security breaches?
Some intentional breaches include accessing data or programs on a computer, leaving a message to indicate presence, and deliberately altering or damaging data.
What does computer security focus on protecting?
Computer security focuses on protecting information, hardware, and software from unauthorized use, as well as preventing damage from intrusions, sabotage, and natural disasters.
What is an intentional breach of computer security often referred to as?
An intentional breach of computer security is often referred to as a computer crime.
What is cybercrime?
Cybercrime (computer crime) is a criminal offense involving a computer or network.
What is cyberterrorism?
Cyberterrorism is politically motivated cybercrime.
What are some types of cybercrime?
Identity theft, internet scams, data manipulation, ransomware, denial of service (DOS) attack, and distributed denial of service (DDOS) attack.
What are the seven basic categories of cybercrime and intrusion perpetrators?
Hacker, cracker, script kiddie, corporate spy, unethical employee, cyberextortionist, and cyberterrorist.
What does the term 'hacker' refer to in the context of cybercrime?
Originally a complimentary word for a computer enthusiast, now has a derogatory meaning and refers to someone who accesses a computer or network illegally.
What is the intent of a hacker's security breaches?
Some hackers claim the intent of their security breaches is to improve security.
What is a 'cracker' in the context of cybercrime?
Someone who accesses a computer or network illegally with the intent of destroying data, stealing information, or other malicious actions.
What are the skills and knowledge of hackers and crackers?
Both hackers and crackers have advanced computer and network skills.
What is a 'script kiddie' in the context of cybercrime?
A script kiddie has the same intent as a cracker but does not have the technical skills and knowledge. They often use prewritten hacking and cracking programs to break into computers.
What is the role of corporate spies in cybercrime?
Some corporate spies have excellent computer and networking skills and are hired to break into a specific computer and steal its proprietary data and information or to help identify security risks in their own organization.
What is corporate espionage?
Unscrupulous companies hire corporate spies (a practice known as corporate espionage) to gain a competitive advantage.
What is the motivation behind unethical employees engaging in cybercrime?
Unethical employees may break into their employer's computers for various reasons, including exploiting security weaknesses, seeking financial gains, or seeking revenge.
What is a cyberextortionist?
A cyberextortionist is someone who uses email as a vehicle for extortion by threatening to expose confidential information or launch an attack that will compromise the organization's network if not paid a sum of money.
What is a cyberterrorist?
A cyberterrorist is someone who uses the Internet or network to destroy or damage computers for political reasons, targeting critical infrastructures such as air traffic control, electricity generation, or telecommunications.
Cyberterrorist
Someone who uses the Internet or network to destroy or damage computers for political reasons.
Cyberwarfare
An attack whose goal ranges from disabling a government's computer network to crippling a country.
Online security service
A website that evaluates your computer to check for Internet and email vulnerabilities and provides recommendations for addressing the vulnerabilities.
Send to Chat
AI Edit
Normal Text
Highlight
Continue adding your notes here.
Scholarly Assistant's Insights
Flashcard deck covering topics related to privacy, security risks, cybercrime, and perpetrators in cybercrime.
Data Privacy
Internet Security
Cybersecurity
Computer Crimes
Network Monitoring
+18 more
Ask Scholarly Assistant
Similar Pages
Login to Leave a Comment
Give your feedback, or leave a comment on a page to share your thoughts with the community.
Login