25 terms

Internet Security Vocabulary


Terms in this set (...)

Any software application in which advertising banners are displayed while the program is running.
Protective software designed to defend your computer against malicious software.
Blacklisting Software
A form of filtering that blocks only sites specified as harmful.
Blocking Software
Computer programs that block access to web sites or other services available over the internet.
A legal device that provides the owner the right to control how a creative work is used.
Sending or posting harmful or cruel text or images using the internet or other digital communication devices.
Terms that can refer to the online enticement of children; rude or threatening messages; slanderous information; or repeated, unwanted messages
The conversion of data into a form, called a ciphertext, that cannot be easily understood by unauthorized people.
The study of human actions. It deals with issues such as defining "right and wrong" as well as the gray area in between.
A popular term for someone who accesses computer information either legally or illegally
Short for malicious software, is software designed to infiltrate or damage a computer system without the owner's informed consent.
Monitoring Software
Software products that allow parents to monitor or track the web sites or e-mail messages that a child visits or reads.
Concerned with the principles of right and wrong behavior and the goodness or badness of human character:
Mouse Trapping
A commonly used technique by pornography sites where a user gets "locked" in a web site.
Courtesy, honesty, and polite behavior practiced on the internet.
An online scam that attacks the browser's address bar. Users type in what they think is a valid web-site address and are unknowingly redirected to an illegitimate site that steals their personal information.
An online scam that uses e-mail to "fish" for users' private information by imitating legitimate companies.
Illegally copying copyrighted software, music, or movies
Privacy Policy
The policy that a company or organization operating a web site uses for handling the personal information collected about visitors to the site.
Public Domain
Openly available to everyone and not subject to copyright protection
E-mail from someone you don't know. It is usually trying to sell you something.
The forgery of an e-mail header so that the message appears to have originated from someone or somewhere other than the actual source
type of malware that is installed on computers and that collects information about users without their knowledge.
Unauthorized access
Is gaining access into any computer, network, storage medium, system, program, file, user area, or other private repository, without the express permission of the owner.
Is a computer program that was written to purposely damage computer systems.