Upgrade to remove ads
3303 quiz 9
Terms in this set (15)
Small data files that are deposited on a user's hard disk when they visit a website are called ____________. These files are harmless in and of themselves, what makes them a potential privacy risk is that they can store information about user, user's preferences, and user's browsing habits
Programs used to secretly record and report an individual's activities on the Internet are called ____________. An example of such programs is an adware software program that records a user's keystrokes on online advertisements and reports them to a research or ad firm.
A _______________ attack attempts to slow down or stop a computer system or network by flooding a computer or network with requests for information and data. These requests can come from a single computer issuing repeated requests.
In 2017, a program called "WannaCry" infected over 250,000 computers in over 150 countries. The attack infected all types of businesses, halting production at car manufacturing plants and delaying patient treatment at hospitals. "WannaCry" is known to be one of various forms of cybercrimes. This type of malicious software is particularly called ______________.
malware is categorized to three common types, including viruses, __________ (one word), and ________ _________. (two words)
worms, trojan horses
___________________ Act is a law allowing prosecution of unauthorized access to computers and databases. Offenders can be sentenced up to 20 years in prison and fined up to $100,000.
computer fraud and abuse
According to _________________________ Act, it is illegal to copy or download copyright-protected music and videos from the Internet without appropriate authorization. The act also establishes that copies of commercial programs may not be legally resold or given away. It further makes it a crime to sell or to use programs or devices that are used to illegally copy software.
digital millennium copyright
Typically, __________________________ is used to (1) control the number of devices that can access a given file and (2) limit the kinds of devices that can access a file. Corporations often use these technologies to prevent copyright violations.
DRM (Digital Rights Management)
_______________ uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account.
______ Wi-Fi hotspot operates close to a legitimate free Wi-Fi hotspot and typically provide stronger signals that many users unsuspectingly connect to. Once a user is connected, it steals information such as username and password sent by the user to legitimate sites.
A _______ acts as a security buffer between a corporation's private network and all external networks, including the Internet. All electronic communications coming into and leaving the corporation must pass through it for evaluation.
Under the _______________________ Act, you are entitled to look at your personal records held by government agencies. The law also allows you to gain access to those records about you that are held by credit bureaus
Freedom of Information
Some federal laws governing privacy matters have been created. For example, the _______________________ Act (FERPA) of 1974 is federal legislation in the United States that protects the privacy of students' personally identifiable information (PII). It restricts disclosure of educational records. The act applies to all educational institutions that receive federal funds.
family educational rights and privacy
_______-party cookies are used by advertising companies to keep track of your web activity as you move from one site to the next.
A ___________, or robot network is formed by a collection of many zombie computers distributed across the Internet, so they are hard to shut down even after they are detected. Unfortunately for individual computer owners, it also can be difficult to detect when a personal computer has been compromised.
THIS SET IS OFTEN IN FOLDERS WITH...
3303 quiz 1+2
3303 quiz 3
3303 quiz 4
3303 quiz 5
OTHER SETS BY THIS CREATOR
4104 ch 21
4104 ch 10
4104 ch 11
OTHER QUIZLET SETS
Summarizing Central Ideas in The Dark Game, Part 1
ECO 202 (Final Exam)
NBDHE oral path
0 La música III - vocabulario para una presentació…