Study your flashcards anywhere!

Download the official Cram app for free >

  • Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off

How to study your flashcards.

Right/Left arrow keys: Navigate between flashcards.right arrow keyleft arrow key

Up/Down arrow keys: Flip the card between the front and back.down keyup key

H key: Show hint (3rd side).h key

A key: Read text to speech.a key


Play button


Play button




Click to flip

22 Cards in this Set

  • Front
  • Back
Identity Theft
The illegal assumption of someone's identity for purposes of economic growth.
Mistaken Identity
The electronic profile of one person is switched with another.
Programs that record virtually every activity on a computer.
Illusion of Anonymity
The misconception that being selective about disclosing personal info on the Internet can prevent an invasion of personal privacy.
History File
Includes the locations of sites visited by your computer system.
Specialized programs that are desposited on your hard disk from Web sites you have visited.
1). Traditional (monitor activities at a single site)
2). Ad network/Adware (monitor your activities across all sites you visit)
Cookie Cutter Programs
Allow users to selectively filter or block the most intrusive cookies while allowing selective traditional cookies to operate.
-ex: AdSubtract, Cookie Cleanup, Cookie Crusher, Cookie Pal, WebWasher
Describes a wide range of programs that are designed to secretly record and report an individual's activities on the Internet.
Info Reseller/Info Broker
Data gatherers that collect and sell personal data. Create electronic profiles (highly detailed and personalized descriptions of individuals)
Computer Crime and 5 Types
Illegal action in which the perpetrator uses special knowledge of computer technology.
1). Employees (biggest category)
2). Outside Users (suppliers/clients- bank)
3). Hackers/Crackers
4). Organized Crime (counterfiiters and forgers)
5). Terrorists
Hackers and Crackers
Hackers: ppl who gain unauthorized access to a computer system for the fun and challenge of it.

Crackers: do same thing but for malicious purposes.
Programs that migrate through networks and operating systems and most attach themselves to different programs and databases.
Special type of virus that doesn't attach itself to programs and databases, but fills the system with self replicating info to clog the system.
Trojan Horses
Programs that come into a computer system disguised as something else. Not viruses, but carriers of viruses.
Denial of Service Attack (DoS)
Attempts to slow down or stop a computer system or network.
Software Piracy
Unauthorized copying of programs for personal gain
Other Hazards
1). Natural hazards
2). Civil strife and terrorism
3). Technological failures
4). Human errors
Concerned with protecting info, hardware, and software, which must be protected from unauthorized use as well as from damage from intrusions, sabotage, and natural disasters.
Measures to Protect Computer Security
1). Encrypting (code all messages sent over a network)
2). Restricting (limit acces to authorized ppl thru passwords, dial-back systems, and firewalls)
3). Anticipating (prepare for disasters with physical and data security thru disaster recovery plan)
4). Backing Up (routinely copy data and store it at a remote location)
Act as a security buffer b/t the corporation's private and external networks, including the Internet.
The study of human factors related to things ppl use. (fitting job to worker not worker comfoming to job)
Green PC
Microcomputer industry concept of an environmentally friendly, low power consuming machine.