Legitimate looking email created to get personal data
Attach themselves to extractable ile
spreads from computer to computer by user action
a universal system of computers and networks
a term used to refer to the Internet, is the unlimited span of networks using the same data exchange methods
the main high-speed routes through which data travels
Transmission Control Protocol/Internet Protocol (TCP/IP)
provides methods for packaging and transmitting information.
Internet service providers (ISPs)
companies that provide access to the Internet and no additional services
connects users to the Internet through a modem and a telephone line.
Digital subscriber line
is a high-speed online connection that requires a special external modem with telephone lines.
provides a high-speed Internet connection using a cable modem, not a phone line.
requires a satellite dish in addition to a phone line and modem for an Internet connection.
fiber-optic service (FiOS)
provides extremely fast Internet access through fiber-optic lines that run directly to users' homes. No modems are required.
World Wide Web (WWW)
Contains billions of documents, is a portion of the Internet, uses the Internet as a means to transport information and is a separate entity from the Internet
Difference between the web and the internet
The Web contains the information. The Internet transports information to and from users.
is a document that may include text, graphics, sound, animation, and video.
a collection of Web pages
a program that displays Web pages and linked items
words and images that bring other documents into view when clicked
uses links to move to additional related information
Hypertext Markup Language (HTML)
uses tags to specify how a Web page should display.
a program that displays a Web document and permits access to linked documents.
are software programs that browsers use for extra features such as sound and video.
Internet Protocol (IP) address
a unique network identifier given to every device connected to the internet
Uniform Resource Locator (URL)
The identification of an Internet resource's type and location is performed through its
Hypertext Transfer Protocol (HTTP)
what the URL is made up of: domain name, path, and resource name.
the second part of a complete URL
The first part of a complete URL
The Domain Name System
a system used by the internet to link domain names with their corresponding IP addresses.
the third part of a complete URL, specifies the location of the document on the server.
the last part of a complete URL, gives the file name of the resource you're accessing.
the process of transferring a file or document from one computer to the user's computer
the process of transferring a file or document from the user's computer to another computer.
a simple web page on which any visitor can post text or images, read previous posts, change posted information, and track earlier changes
internet equivalent of a journal
used by search engines to roam the world wide web via the internet
specialized search engines
index information such as job advertisements, and names and addresses.
provide organized subject guide links to topics such as the news, local weather, and e-mail.
generally a plus sign (+), used so that only Web pages including those criteria are retrieved
generally a minus sign (-), are used so that only Web pages excluding those criteria are retrieved
are used to perform complex searches.
symbols, such as ? and *, replace the zero or additional characters in search words to improve search accuracy.
a set of standards that define how two types of programs can communicate with each other through the Internet
is a type of application software that makes sending and receiving messages through computer networks possible
a computer file included with an e-mail message.
Unsolicited e-mails received by users, usually from advertisers
alert the sender that the spam message has been opened, adding your address to a list of validated addresses.
spam that targets users of instant messaging
an international discussion system available through the Internet.
a series of guidelines for good manners when using an Internet service
angry messages sent by other users
Business-to-Business (B2B) E-Commerce
refers to a business providing supplies to other businesses via the Internet
Consumer-to-Consumer (C2C) E-Commerce
refers to the exchange of business between individuals. eBay is a good example.
Business-to-Consumer (B2C) E-Commerce
shopping online rather than at a physical store
use email, instant messaging, chat rooms, pagers, cell phone, or other forms of information technology to make repeated credible threats of violence against another individual or family members of an individual
when one individual targets another for some form of torment or abuse through digital tools
small files written to your hard disk by the Web sites you visit
an individual's ability to eliminate the collection, use, and sale of confidential personal information
the means to communicate without disclosing one's identity
Radio frequency identification (RFID)
uses radio waves to track a chip or tag
Interacting with multiple networked devices
can transmit infrared signals to create an electronic trail
are crimes perpetrated through the Internet
is the area of law dedicated to computer crime
when a criminal gains access to personal information in order to impersonate someone
programs that intentionally harm a computer system or allow individuals to gain access to it without the owner's permission
a form of spyware that generates annoying pop-up and banner ads
record keystrokes to provide cybercriminals with confidential data
attach to data files and take advantage of application macros
execute each time you start the computer
code concealed inside a program that can harm or destroy files
a virus program that remains dormant on a computer system until it is activated by a specific event
similar to a virus but does not need the action of a user to execute the code and cause damage
which can be hardware or software, to prevent unauthorized access.
authentication—the use of voice recognition, retinal scans, and fingerprint scans for authentication purposes.
insiders modify data by altering accounts or database records so that it's difficult or impossible to tell that they've stolen funds or equipment
a programer alters a program to subtract a small amount of money from an account.
knowledgeable thieves remove some of a computer's RAM chips but leave enough to start the computer.