Cyber Laws & Ethics #1

4.4 (15 reviews)
cyber Law
Click the card to flip 👆
1 / 30
Terms in this set (30)
geographical boundariesboundaries that exist to designate city, county, state, and national areas.jurisdictiona system of laws or courts that hold authority or control of an area.encryptedElectronic data that has been encoded so that only authorized parties can read systemsComputers and related devices that use the binary system (two digits)malwareSoftware that is intended to damage or disable computers and computer systems.virusA piece of code that is capable of copying itself and has a detrimental effect, such as corrupting the system or destroying data.trojan horse virusA type of malware program that substitutes itself as a legitimate program.phishing attackthe attempt to get sensitive information such as usernames, passwords, and credit card details often for malicious reasons, by disguising as a trustworthy entity in an electronic communication most commonly emails.DDoS (Distributed Denial of Service)a type of attack where multiple virus-infected computers are used to target a single system, overwhelming it with traffic, rendering it useless or unresponsive.Browser HijackerA malicious program that infects your Web browser and can change your home page or browser settings. It can also redirect your browser to unwanted sites, produce pop-up ads, and set unwanted bookmarks. Also called a home page hijacker.Resident VirusA virus that can access computer memory and sit dormant until a payload is delivered is considered a resident virus. This malware may stay dormant until a specific date, time, or a user performs an action.SpywareA type of Malware that locates and saves data from users without them knowing about it.WormA destructive computer program that bores its way through a computer's files or through a computer's network.Ransomwarea form of malicious software that infects your computer and asks for moneyAdwareA software program that delivers advertising content in a manner that is unexpected and unwanted by the user.Ethicsthe principles of right and wrong that guide an individual in making decisionscensorshiprestricting access to ideas and informationmonitorTo watch closely and frequently; to observe and make choices based on a set of rules.human rightsa right that is believed to belong justifiably to every person.freedom of speechthe right to express any opinions without censorship or restraint.