Are small data files deposited on your hard disk from websites you have visited?

Card Range To Study

through

Are small data files deposited on your hard disk from websites you have visited?

Are small data files deposited on your hard disk from websites you have visited?

Are small data files deposited on your hard disk from websites you have visited?

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

  • Share
  • Print
  • Export
  • Clone

22 Cards in this Set

  • Front
  • Back

Accuracy:

relates to the responsibility of those who collect data to ensure that the data is correct

Property:

relates to who owns data and rights to software.

Access:

relates to the responsibility of those who have data to control and able to use that data.

private Networks:

Many organizations monitor employee email and computer files using special software called employee-monitoring software .

these programs record everything you do on the compute

cookies

are small data files that are deposited on your hard disk from websites you have visited.

Web bugs

are invisible images or HTML code hidden within a web page or e-mail message, can be used to transmit information without your knowledge

Spyware

are programs designed to secretly record and report an individual's activities on the Internet.

Keystroke loggers:

most dangerous type of spyware that record your activities

Computer security

specifically focuses on protecting information, hardware, and software from unauthorized use.

Cybercrime or computer crime

Is any criminal offense that involves a computer and a network

A cracker

is someone who creates and distributes malicious programs

Malicious Programs (malware):

specifically designed to damage a computer system

A cracker

is someone who creates and distributes malicious programs

Malicious Programs (malware):

specifically designed to damage a computer system

Restriting

Limit access to authorized persons using such measures as pass words and firewalls

Encrypting

Code all messages sent over a network

Anticipating

Prepare for disasters by ensuring physical security and data security through a disaster recovery plan

Preventing

Routinely copy data and store it at a remote location

Computer ethics

are guidelines for the morally acceptable use of computers in our society.

Copyright

is a legal concept that gives content creators the right to control use and distribution of their work

Plagiarism

means representing some other person's work and ideas as your own without giving a credit to the original source.

Turnitin service

examines a papers content compares it to a wide range of electronic documents to detect plagiarism

Are small data files that are deposited on your hard disk from Web sites you have visited?

Cookies are tiny files deposited on a computer hard drive when a user visits certain Web sites that track visits to the Web site.

What are the 3 primary privacy issues?

Information mishandling, snooping and location tracking are often the ways in which users find their privacy violated online.

Which of the following browser mode ensures that your browsing activity is not recorded?

Private Browsing It will also not store the information you type into online forms nor cache any of the data to the hard drive. In Internet Explorer, this feature is known as InPrivate Browsing. Although InPrivate Browsing will not store search entries or Web sites, it does cache data to the hard drive.

What are programs designed to secretly record and report Internet activities?

What is spyware? Spyware is a term that refers to malicious software that is purposely designed to access a computer and record its activity. Spyware can track and record a user's browsing habits, login credentials, passwords, etc.