29 terms

Internet Unit Terms

STUDY
PLAY

Terms in this set (...)

Intellectual Property
Property of the mind including ideas, inventions and creations such as art and music.
Cyberbullying
Harassment, taunting, and teasing committed online, such as in chat rooms or by posting inappropriate or false information or images of someone.
Firewall
Internet security software and/or hardware that protects your computer against unauthorized access.
Phishing
Tricking users into providing information such as passwords and bank account numbers by way of emails.
Plagiarism
Copying or using someones else's work and taking credit for it without acknowledging the real author.
Spyware
Malicious software that enters a computer and tracks or gathers personal information without the users knowledge.
Trojan Horse
Computer program that appears to be a helpful or harmless application, but actually causes damage to a computer once downloaded.
Computer Virus
Malicious software that enters a computer and negatively affects that computer's ability to run correctly.
Copyright
An owner's the exclusive legal right to reproduce, publish, sell, or distribute their own original work.
Cookie
A small file downloaded by websites to store information on your browser.
File Sharing programs
P2P programs that allow users to access the same file at the same time.
Flaming
Sending a deliberately confrontational message to others on the internet.
Hard Copy
Printed copy
Soft Copy
Electronic version of a file.
Netiquette
Courtesy, honesty, and polite behavior practiced on the internet.
Online Grooming
Manipulation of a minor to gain their trust for illegal behavior.
Piracy
Illegally copying copyrighted software, music or movies.
Malware
Malicious Software.
Identity Theft
The fraudulent use of another's personal information, usually for financial gain.
Fair Use
Allows for educational use of copyrighted material.
Keylogger malware
A program that records every key struck o n a keyboard and sends that information to an attacker.
Ransomware
A type of malware that holds the victim's computer files hostage. An encrypted code must be bought to free the files.
Bandwidth
The amount of data that can pass through a network or part of a network per second.
Botnet
Multiple computers on a network that are infected with a program that can be controlled remotely.
DDos
Distributed Denial of Service Attack. Attempts to make a website unavailable by overwhelming it with a flood of traffic.
Doxnet
A fictional virus modeled after Stuxnet. It can damage the physical infrastructure of a computer.
Encryption
The process of using codes to make readable information unreadable.
Hacktivist
Someone who uses computers and computer networks to disrupt services or share secret information in an effort to draw attention to political or social issues.
Cyber Ethics
Knowing the "right" and "wrong" of technology usage.