Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
24 Cards in this Set
- Front
- Back
Types of purchases that can link the customer to their purchase |
check, credit card, debit mail order, online using a 'preferred' customer number signing up for a warrenty, service agreement, or rebate |
|
Ways personal information can be used: No use |
information is deleted when the store is finished with it |
|
Ways personal information can be used: Approval or Opt-in |
The store can use info for other purposes but only if you say it's ok |
|
Ways personal information can be used: Objection or Opt-out |
The store can use the info but only if you don't tell the store not to |
|
Ways personal information can be used: No limits |
The store uses info any way it wants to |
|
4 main areas of privacy |
a person's body a person's territory a person's information communication |
|
Voluntary disclosure |
Releasing information to others |
|
Fair Information Practices |
uses eight principles defined by Organization for Economic Cooperation and Development Sets clear guidelines re individuals privacy |
|
Eight Principles: OECD Fair Info Practice Guidelines |
Limited Collection Purpose for Collection should be stated Quality (relevant data) Use Limitation Security Openness Participation Accountability |
|
Two types of Tracking in Online Privacy |
online tracking: web sites automatically store and send info about visits to their site or other content providers cell phone tracking: positioning info maps physical location |
|
Cookies |
A CSCI concept that connects the identity of a client across many client/server interactions. Exchanged each time info is sent across a client server interaction so the server can recognize who is requesting what information |
|
Risks to Computers (DIGITAL SECURITY) |
Mischief - infecting a computer, causing a nuisance, erasing files, trashing files, etc Information Theft - stealing personal info Spying - recording videos of the user, logging keystrokes, Compromising secure online transactions Resource Theft - taking over a computer |
|
Malware |
malicious software that harms computers |
|
Virus |
Shared program that contains code to reproduce itself |
|
Worm |
Program that is often embedded in an email attachment, reproduces itself, and sends a copy to everyone in your contact list |
|
Exploit |
When software takes advantage of bugs in commercial software |
|
Trojan |
Malicious program that performs unauthorized activiities |
|
Forms of Malware: Backdoors |
Software that creates an access path allowing attackers to run any program on your computer |
|
Forms of Malware: Trojans |
Could record every keystroke you make looking for passwords, credit card numbers, banking info |
|
Forms of Malware: Rootkits |
Infect your comp and fight back against security systems |
|
Encyrption |
The process in which info is recoded to hide its true meaning Info is sent encoded, then the recipient can de-code info using a key There are two types of keys: public and private |
|
5 step algorithm for simple private key encryption |
- sender breaks message into letter groups - sender 'multiplies' each group of letters by the key - sender transmits message to reciever - reciever 'divides' the message by the key to recreate the groups - receiver assembles the groups into the message |
|
Two types of Backups |
Full backups - complete copies of everything on a system at a given date and time Partial backups - consist of files that have been changed/created since the last partial or full backup |
|
Cloud |
a non local storage space maintained by some specific company |