Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
25 Cards in this Set
- Front
- Back
Cookies |
Small files stored on a computer which are saved when a user visits websites; collect information used for customizing websites, demographic information and tracking user preferences |
|
Copyrights |
Protect an author's original work automatically when a work is created; denoted by the symbol (c) |
|
Cracker |
Someone who illegally alters computer hardware or breaches computer systems |
|
Cyberbullying |
Internet harassment |
|
Cybercrime |
Any crime involving computers |
|
Encryption |
A security message used on today's internet which insures the data is secure |
|
Federal Trade Commission |
Federal regulatory body which monitors and deals with identity theft |
|
Fourth Amendment |
Designed to control searches and seizures of homes and property; now adapted and applied to searches and seizures of computers |
|
Hacker |
An individual who alters electronics legally |
|
Hacking |
Modifying electronics such as an Xbox, cell phone, or iPod |
|
Hate Mail |
A form of cybercrime where offensive letters are sent through e-mail |
|
Patents |
Protect inventions and discoveries |
|
IC3 ( Internet Crime Complaint Center) |
A partnership between the FBI and the National White Collar Crime Center; serves as a place for individuals and law enforcement to file complaints about cyber crime |
|
Identity Theft |
When someone steals personal information to commit fraud or other crimes |
|
Internet Harassment |
Online harassment; can happen when e-mails are abusive; also comes about if talk online forums becomes threatening |
|
Password Trafficking |
The illegal obtaining, giving or selling of passwords |
|
Phishing |
Involves fraudulent e-mails pretending to originate from banks or online retailers such as eBay or PayPal |
|
Pirating |
The illegal stealing, copying or spreading of media including software, movies and music |
|
Predators |
Take advantage of kids by using instant messaging, e-mail and social network sites |
|
Spyware |
Software installed discreetly which alters the usability of a computer |
|
Trademarks |
Legally protect words or symbols used to identify the source of goods and services |
|
United States Computer Emergency Readiness Team ( USCERT) |
A partnership between the Department of Homeland Security and the public and private sectors; protects our nation against cyber attacks |
|
Viruses |
Software programs which spread from computer to computer and are malicious in nature |
|
Wire Fraud |
Stealing money or property using interstate wire communication; considered a federal crime |
|
Wires |
Refer to TV, radio or the internet; means of communication |