25 terms

Internet Security Vocabulary

STUDY
PLAY

Terms in this set (...)

Adware
Any software application in which advertising banners are displayed while the program is running.
Antivirus
Protective software designed to defend your computer against malicious software.
Blacklisting Software
A form of filtering that blocks only sites specified as harmful.
Blocking Software
Computer programs that block access to web sites or other services available over the internet.
Copyright
A legal device that provides the owner the right to control how a creative work is used.
Cyberbullying
Sending or posting harmful or cruel text or images using the internet or other digital communication devices.
Cyberstalking/Harassment
Terms that can refer to the online enticement of children; rude or threatening messages; slanderous information; or repeated, unwanted messages
Encryption
The conversion of data into a form, called a ciphertext, that cannot be easily understood by unauthorized people.
Ethics
The study of human actions. It deals with issues such as defining "right and wrong" as well as the gray area in between.
Hacker
A popular term for someone who accesses computer information either legally or illegally
Malware
Short for malicious software, is software designed to infiltrate or damage a computer system without the owner's informed consent.
Monitoring Software
Software products that allow parents to monitor or track the web sites or e-mail messages that a child visits or reads.
Moral
Concerned with the principles of right and wrong behavior and the goodness or badness of human character:
Mouse Trapping
A commonly used technique by pornography sites where a user gets "locked" in a web site.
Netiquette
Courtesy, honesty, and polite behavior practiced on the internet.
Pharming
An online scam that attacks the browser's address bar. Users type in what they think is a valid web-site address and are unknowingly redirected to an illegitimate site that steals their personal information.
Phishing
An online scam that uses e-mail to "fish" for users' private information by imitating legitimate companies.
Piracy
Illegally copying copyrighted software, music, or movies
Privacy Policy
The policy that a company or organization operating a web site uses for handling the personal information collected about visitors to the site.
Public Domain
Openly available to everyone and not subject to copyright protection
Spam
E-mail from someone you don't know. It is usually trying to sell you something.
Spoofing
The forgery of an e-mail header so that the message appears to have originated from someone or somewhere other than the actual source
Spyware
type of malware that is installed on computers and that collects information about users without their knowledge.
Unauthorized access
Is gaining access into any computer, network, storage medium, system, program, file, user area, or other private repository, without the express permission of the owner.
Virus
Is a computer program that was written to purposely damage computer systems.