Computer Security and Privacy
Terms in this set (29)
Small program that gets installed on a computer while browsing the Internet
To make a duplicate copy of a program, a disk, or data.
Temporary memory on your computer that is sometimes used to store local copies of files opened when you browse the Internet.
Keeping a user's data, including personal files and e-mail messages, such that the data is not accessible by anyone without appropriate permission.
The protection of a computer system and its data from accidental or intentional loss and tampering.
A small file on a computer that is created when a user visits a Web site
A method of protecting the rights of an originator of a creative work, such as text, piece of music, painting, or computer program, through law.
when a child, preteen or teen is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child, preteen or teen using the Internet, interactive and digital technologies or mobile phones.
The process of reconverting the encrypted data into a readable and usable form.
The process of converting data into an unreadable and unusable form
A filter that blocks unreliable information from the Internet before it reaches your computer or a private network.
A person who uses computer expertise to gain unauthorized access to a computer, and then misuses or tampers the programs and data stored on the computer.
Any information available on the Internet, which is legally owned by the person who created it
Written defamation that has been published.
An individual who develops contact with Internet users, through chat rooms, online forums, or e-mail, to exploit them financially or involve them in dangerous relationships
A unique string of characters that a user types in as an identification code. It is a security measure used to restrict access to computer systems and sensitive files.
The act of extracting personal information, such as passwords and credit card details, from computer users and then use the information for malicious purposes
The act of copying someone's work and using it as if it is your own work, without mentioning the source
A sudden increase in line voltage, which may lead to the damage of electronic devices, such as computers.
Secure Sockets Layer
An Internet security protocol that ensures secure data communication by encrypting the information transmitted.
The sending of sexually explicit photos, images, text messages, or e-mails by using a cell phone or other mobile device
Unauthorized copying of copyrighted software without obtaining the license or permission of its copyright owner is software piracy
An irrelevant and unsolicited e-mail message sent by an unknown sender
A computer program that is installed on your computer without your knowledge
A destructive computer program disguised as a game, utility, or software
The name by which a user is identified to a computer system or network
A computer program that is designed to cause malfunctioning of a computer or damage the data stored on the computer.
A computer program that propagates itself across computers, usually by creating copies of itself in each computer's memory
YOU MIGHT ALSO LIKE...
Introduction to Business | Gaspar, Bierman, Kolari, Hise, Smith, Arreola-Risa
MDL Computer Security and Privacy
Computer Safety and Privacy
Chapter 11 CISM vocab
OTHER SETS BY THIS CREATOR
Exploring Career Decisions 3.01
Exploring Career Decisions Unit 3.01 Vocab
Exploring Career Decisions Unit 3.02
THIS SET IS OFTEN IN FOLDERS WITH...
Common Computer Technology
The World Wide Web