Terms in this set (21)
The act of copying someone else's work and publishing it as your own.
The exclusive right, granted by law for a certain number of years, to make and dispose of literary, musical, or artistic work.
The illegal copying or use of computer programs.
Information or content to which copyright protection does not apply and that is available for anyone to copy.
Criminal activity done using computers and the Internet.
Expert computer user who invade someone else's computer either from personal gain or simply for the satisfaction of being able to do it.
Small programs or scripts that can negatively affect the health of your computer.
A computer virus that replicates itself, but does not altar any files...but it multiplies so many times that they take up all your computer's available memory.
Computer virus that does something different from what it is expected to do; poses as regular, even antivirus programs.
Tricking or deceiving computer systems or other computer users; this is typically done by hiding one's identity or faking the identity of another user on the Internet.
A combination of hardware and software that creates a buffer between an internal network and the Internet to prevent unauthorized users.
The coding or scrambling of information so that it can only by decoded and read by someone who has the correct decoding key.
Can capture information like web browsing habits, e-mail messages, usernames and passwords, and credit cards.
Unsolicited commercial email that is sent to many people at the same time to promote products or services; also called "junk" email.
The crime of obtaining someone else's personal data and using it for financial gain or to defraud or deceive.
Small text files created by some Web pages when you visit the site that may include information about your preferences for the Web page; cookie files are stored on your computer.
Attempting to steal your personal information by sending out emails that appear to come from legitimate websites such as eBay, PayPal, or other banking institutions.
A legal statement which indicates the terms under which a user may make use of a software product.
A copy of one or more files created as an alternate in case the original data is lost or becomes unusable.
A set of moral principles that control the use of computers; knowing what is right and wrong while using a computer.
The application of scientifically proven methods to other, process, interpret, and use digital evidence to provide a description of cybercrime activities.