• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/24

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

24 Cards in this Set

  • Front
  • Back

Types of purchases that can link the customer to their purchase

check, credit card, debit


mail order, online


using a 'preferred' customer number


signing up for a warrenty, service agreement, or rebate

Ways personal information can be used:


No use

information is deleted when the store is finished with it

Ways personal information can be used:


Approval or Opt-in

The store can use info for other purposes but only if you say it's ok

Ways personal information can be used:


Objection or Opt-out

The store can use the info but only if you don't tell the store not to

Ways personal information can be used:


No limits

The store uses info any way it wants to

4 main areas of privacy

a person's body


a person's territory


a person's information


communication

Voluntary disclosure

Releasing information to others

Fair Information Practices

uses eight principles defined by Organization for Economic Cooperation and Development




Sets clear guidelines re individuals privacy

Eight Principles: OECD Fair Info Practice Guidelines

Limited Collection


Purpose for Collection should be stated


Quality (relevant data)


Use Limitation


Security


Openness


Participation


Accountability

Two types of Tracking in Online Privacy

online tracking: web sites automatically store and send info about visits to their site or other content providers




cell phone tracking: positioning info maps physical location

Cookies

A CSCI concept that connects the identity of a client across many client/server interactions.




Exchanged each time info is sent across a client server interaction so the server can recognize who is requesting what information

Risks to Computers (DIGITAL SECURITY)

Mischief - infecting a computer, causing a nuisance, erasing files, trashing files, etc


Information Theft - stealing personal info


Spying - recording videos of the user, logging keystrokes, Compromising secure online transactions


Resource Theft - taking over a computer

Malware

malicious software that harms computers

Virus

Shared program that contains code to reproduce itself

Worm

Program that is often embedded in an email attachment, reproduces itself, and sends a copy to everyone in your contact list

Exploit

When software takes advantage of bugs in commercial software

Trojan

Malicious program that performs unauthorized activiities

Forms of Malware:


Backdoors

Software that creates an access path allowing attackers to run any program on your computer

Forms of Malware:


Trojans

Could record every keystroke you make looking for passwords, credit card numbers, banking info

Forms of Malware:


Rootkits

Infect your comp and fight back against security systems

Encyrption

The process in which info is recoded to hide its true meaning




Info is sent encoded, then the recipient can de-code info using a key




There are two types of keys: public and private

5 step algorithm for simple private key encryption

- sender breaks message into letter groups


- sender 'multiplies' each group of letters by the key


- sender transmits message to reciever


- reciever 'divides' the message by the key to recreate the groups


- receiver assembles the groups into the message

Two types of Backups

Full backups - complete copies of everything on a system at a given date and time




Partial backups - consist of files that have been changed/created since the last partial or full backup

Cloud

a non local storage space maintained by some specific company