hello quizlet
Home
Subjects
Expert solutions
Log in
Sign up
Social Science
Sociology
(2020) #16 Internet Security
4.4 (21 reviews)
Flashcards
Learn
Test
Match
Flashcards
Learn
Test
Match
Created by
CTECS_Vocab
Teacher
Terms in this set (19)
personal Internet use
using the Internet for anything other than work tasks
professional Internet use
using the Internet, ethically, for work-related tasks
ethical Internet use
using online services and social networking ethically, by being a good online citizen, by adhering to privacy and safety guidelines, and by facilitating thoughtful and considerate communication with others
Internet security risks
the level one exposes one's self or professional network to unethical intentions (e.g., end-user attacks, server-side attacks)
Internet use policy
a formal document with which many organizations require employees to comply, addressing the separation of personal and workplace use of the Internet, email etiquette, and security measures and safeguards that employees must obey.
end-User attacks
unethical and often unnoticed attacks by others in the public sphere when operating online (e.g., malware, phishing, Trojan horse, virus, worm, spam, rootkit)
malware
includes viruses and ransomware running on your device which can take over the operation of your device or quietly watch your operations and keystrokes and steal confidential information from your network; usually requires the user to initiate by unwittingly installing the malicious software
phishing
pretending to be someone you trust or a system you work with, to get you to visit a fictitious site and enter your login or other private info
Trojan horse
malware disguised as a trusted source that convinces the user to open a link or an attachment and install itself.
Term
virus
Definition
malware that spreads by users from an infected device to the rest of the devices on a network/system
Location