26 terms

Chapter 15 - Computer Security and Privacy

STUDY
PLAY

Terms in this set (...)

Hardware theft
The theft of computer hardware.
System failure
The complete malfunction of a computer system.
Full disk encryption (FDE)
A technology that encrypts everything stored on a storage medium automatically, without any user interaction.
Self-encrypting hard drive
A hard drive that uses full disk encryption (FDE).
Ruggedized device
A device (such as a portable computer or mobile phone) that is designed to withstand much more physical abuse than a conventional device.
Surge suppressor
A device that protects a computer system from damage due to electrical fluctuations.
Uninterruptible power supply (UPS)
A device containing a built-in battery that provides continuous power to a computer and other connected components when the electricity goes out.
Disaster recovery plan
A written plan that describes the steps a company will take following the occurrence of a disaster.
Software piracy
The unauthorized copying of a computer program.
Digital counterfeiting
The use of computers or other types of digital equipment to make illegal copies of currency, checks, collectibles, and other items.
Privacy
The state of being concealed or free from unauthorized intrusion.
Information privacy
The rights of individuals and companies to control how information about them is collected and used.
Marketing database
A collection of data about people that is stored in a large database and used form marketing purposes.
Government database
A collection of data about people that is collected and maintained by the government.
Electronic profiling
Using electronic means to collect a variety of in-depth information about an individual, such as name, address, income, and buying habits.
Privacy policy
A policy, commonly posted on a company's Web site, that explains how personal information provided to that company will be used.
Spam
Unsolicited, bulk e-mail sent over the Internet.
Throw-away e-mail address
An e-mail address used only for nonessential purposes and activities that may result in spam; the address can be disposed of and replaced if spam becomes a problem.
E-mail filter
A tool that automatically sorts your incoming e-mail messages based on specific criteria.
Spam filter
An e-mail filter used to redirect spam from a user's inbox.
Opt out
To request that you be removed from marketing activities or that your information not be shared with other companies.
Opt in
To request that you be included in marketing activities or that your information be shared with other companies.
Computer monitoring software
Software that can be used to record an individual's computer usage, such as capturing images of the screen, recording the actual keystrokes used, or creating a summary of Web sites and programs accessed.
Video surveillance
The use of video cameras to monitor activities of individuals, such as employees or individuals in public locations, for work-related or crime-prevention purposes.
Employee monitoring
Observing or reviewing employees' actions while they are on the job.
Presence technology
Technology that enables one computing device (such as a computer or mobile phone) to locate and identify the current status of another device on the same network.