• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/25

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

25 Cards in this Set

  • Front
  • Back

Cookies

Small files stored on a computer which are saved when a user visits websites; collect information used for customizing websites, demographic information and tracking user preferences

Copyrights

Protect an author's original work automatically when a work is created; denoted by the symbol (c)

Cracker

Someone who illegally alters computer hardware or breaches computer systems

Cyberbullying

Internet harassment

Cybercrime

Any crime involving computers

Encryption

A security message used on today's internet which insures the data is secure

Federal Trade Commission

Federal regulatory body which monitors and deals with identity theft

Fourth Amendment

Designed to control searches and seizures of homes and property; now adapted and applied to searches and seizures of computers

Hacker

An individual who alters electronics legally

Hacking

Modifying electronics such as an Xbox, cell phone, or iPod

Hate Mail

A form of cybercrime where offensive letters are sent through e-mail

Patents

Protect inventions and discoveries

IC3 ( Internet Crime Complaint Center)

A partnership between the FBI and the National White Collar Crime Center; serves as a place for individuals and law enforcement to file complaints about cyber crime

Identity Theft

When someone steals personal information to commit fraud or other crimes

Internet Harassment

Online harassment; can happen when e-mails are abusive; also comes about if talk online forums becomes threatening

Password Trafficking

The illegal obtaining, giving or selling of passwords

Phishing

Involves fraudulent e-mails pretending to originate from banks or online retailers such as eBay or PayPal

Pirating

The illegal stealing, copying or spreading of media including software, movies and music

Predators

Take advantage of kids by using instant messaging, e-mail and social network sites

Spyware

Software installed discreetly which alters the usability of a computer

Trademarks

Legally protect words or symbols used to identify the source of goods and services

United States Computer Emergency Readiness Team ( USCERT)

A partnership between the Department of Homeland Security and the public and private sectors; protects our nation against cyber attacks

Viruses

Software programs which spread from computer to computer and are malicious in nature

Wire Fraud

Stealing money or property using interstate wire communication; considered a federal crime

Wires

Refer to TV, radio or the internet; means of communication