29 terms

Internet Unit Terms


Terms in this set (...)

Intellectual Property
Property of the mind including ideas, inventions and creations such as art and music.
Harassment, taunting, and teasing committed online, such as in chat rooms or by posting inappropriate or false information or images of someone.
Internet security software and/or hardware that protects your computer against unauthorized access.
Tricking users into providing information such as passwords and bank account numbers by way of emails.
Copying or using someones else's work and taking credit for it without acknowledging the real author.
Malicious software that enters a computer and tracks or gathers personal information without the users knowledge.
Trojan Horse
Computer program that appears to be a helpful or harmless application, but actually causes damage to a computer once downloaded.
Computer Virus
Malicious software that enters a computer and negatively affects that computer's ability to run correctly.
An owner's the exclusive legal right to reproduce, publish, sell, or distribute their own original work.
A small file downloaded by websites to store information on your browser.
File Sharing programs
P2P programs that allow users to access the same file at the same time.
Sending a deliberately confrontational message to others on the internet.
Hard Copy
Printed copy
Soft Copy
Electronic version of a file.
Courtesy, honesty, and polite behavior practiced on the internet.
Online Grooming
Manipulation of a minor to gain their trust for illegal behavior.
Illegally copying copyrighted software, music or movies.
Malicious Software.
Identity Theft
The fraudulent use of another's personal information, usually for financial gain.
Fair Use
Allows for educational use of copyrighted material.
Keylogger malware
A program that records every key struck o n a keyboard and sends that information to an attacker.
A type of malware that holds the victim's computer files hostage. An encrypted code must be bought to free the files.
The amount of data that can pass through a network or part of a network per second.
Multiple computers on a network that are infected with a program that can be controlled remotely.
Distributed Denial of Service Attack. Attempts to make a website unavailable by overwhelming it with a flood of traffic.
A fictional virus modeled after Stuxnet. It can damage the physical infrastructure of a computer.
The process of using codes to make readable information unreadable.
Someone who uses computers and computer networks to disrupt services or share secret information in an effort to draw attention to political or social issues.
Cyber Ethics
Knowing the "right" and "wrong" of technology usage.