Chapter 15 - Computer Security and Privacy
Terms in this set (26)
The theft of computer hardware.
The complete malfunction of a computer system.
Full disk encryption (FDE)
A technology that encrypts everything stored on a storage medium automatically, without any user interaction.
Self-encrypting hard drive
A hard drive that uses full disk encryption (FDE).
A device (such as a portable computer or mobile phone) that is designed to withstand much more physical abuse than a conventional device.
A device that protects a computer system from damage due to electrical fluctuations.
Uninterruptible power supply (UPS)
A device containing a built-in battery that provides continuous power to a computer and other connected components when the electricity goes out.
Disaster recovery plan
A written plan that describes the steps a company will take following the occurrence of a disaster.
The unauthorized copying of a computer program.
The use of computers or other types of digital equipment to make illegal copies of currency, checks, collectibles, and other items.
The state of being concealed or free from unauthorized intrusion.
The rights of individuals and companies to control how information about them is collected and used.
A collection of data about people that is stored in a large database and used form marketing purposes.
A collection of data about people that is collected and maintained by the government.
Using electronic means to collect a variety of in-depth information about an individual, such as name, address, income, and buying habits.
A policy, commonly posted on a company's Web site, that explains how personal information provided to that company will be used.
Unsolicited, bulk e-mail sent over the Internet.
Throw-away e-mail address
An e-mail address used only for nonessential purposes and activities that may result in spam; the address can be disposed of and replaced if spam becomes a problem.
A tool that automatically sorts your incoming e-mail messages based on specific criteria.
An e-mail filter used to redirect spam from a user's inbox.
To request that you be removed from marketing activities or that your information not be shared with other companies.
To request that you be included in marketing activities or that your information be shared with other companies.
Computer monitoring software
Software that can be used to record an individual's computer usage, such as capturing images of the screen, recording the actual keystrokes used, or creating a summary of Web sites and programs accessed.
The use of video cameras to monitor activities of individuals, such as employees or individuals in public locations, for work-related or crime-prevention purposes.
Observing or reviewing employees' actions while they are on the job.
Technology that enables one computing device (such as a computer or mobile phone) to locate and identify the current status of another device on the same network.
YOU MIGHT ALSO LIKE...
Test Preparation TOEIC, SAT, TOEFL
BCIS Chapter 5: Computer Security and Privacy
Computer Class Chapter 6
Chapter 6 Info Tech
OTHER SETS BY THIS CREATOR
Business Management Ch 8-11
Chapter 16 - Intellectual Property Rights, Ethics, Health, Access, and the Environment
Chapter 13 - Program Development and Programming Languages
Chapter 12 - Information Systems and System Development
THIS SET IS OFTEN IN FOLDERS WITH...
Chapter 1 - Introduction to the World of Computers
Chapter 2 - The System Unit: Processing and Memory
Chapter 7 - Computer Networks
Chapter 8 - Internet and the World Wide Web