Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Terminology and Definitions in Computer Science and Cybersecurity, Quizzes of Information Technology

Definitions for various terms related to computer science and cybersecurity, including bot herder, botnet, carding, cloning, computer crime, computer ethics, computer fluency, computer forensics, and more. These terms cover a range of topics such as hacking, cyberbullying, cyberstalking, cyberterrorism, and information privacy.

Typology: Quizzes

2010/2011

Uploaded on 05/08/2011

alimoherek
alimoherek 🇺🇸

95 documents

1 / 11

Toggle sidebar

Related documents


Partial preview of the text

Download Terminology and Definitions in Computer Science and Cybersecurity and more Quizzes Information Technology in PDF only on Docsity! TERM 1 bot herder DEFINITION 1 computer criminal "owning" a botnet TERM 2 botnet DEFINITION 2 collection of zombie computers used for destructive activities or spamming TERM 3 carding DEFINITION 3 stealing credit card information for one's own use, or to sell TERM 4 cloning DEFINITION 4 using scanners to steal wireless transmitter codes for cell phones, then duplicating the codes for illegal use TERM 5 computer crime DEFINITION 5 the use of a computer to commit an illegal act TERM 6 computer ethics DEFINITION 6 a broad range of issues and standards of conduct that have emerged through the use and proliferation of information systems TERM 7 computer fluency DEFINITION 7 the ability to independently learn new technologies as they emerge and assess their impact on one's work and life TERM 8 computer forensics DEFINITION 8 the use of formal investigative techniques to evaluate digital information for judicial review TERM 9 computer literacy DEFINITION 9 the knowledge of how to operate a computer TERM 10 copyright DEFINITION 10 a form of intellectual property, referring to creations of the mind such as music, literature, or software TERM 21 hacker DEFINITION 21 individual who gains unauthorized access to computer systems TERM 22 hacktivist DEFINITION 22 cybercriminal pursuing political, religious, or ideological goals TERM 23 identity theft DEFINITION 23 stealing another person's Social Security number, credit card number, and other personal information for the purpose of using the victim's credit rating to borrow money, buy merchandise, and run debts that are never repaid TERM 24 information accessibility DEFINITION 24 an ethical issue that focuses on defining what information a person or organization has the right to obtain about others and how this information can be access and used TERM 25 information accuracy DEFINITION 25 an ethical issue concerned with the authenticity and fidelity of information, as well as identifying who is responsible for informational errors that harm people TERM 26 Information Age DEFINITION 26 a period of time in society when information became a valuable or dominant currency TERM 27 information privacy DEFINITION 27 an ethical issue that is concerned with what information an individual should have to reveal to others through the course of employment or through other transactions such as online shopping TERM 28 information property DEFINITION 28 an ethical issue that focuses on who owns information about individuals and how information can be transferred, sold, and exchanged TERM 29 IP DEFINITION 29 intellectual property: creations of the mind that have commercial value TERM 30 Internet hoax DEFINITION 30 a false message circulated online about any topic of public interest, typically asking the recipient to perform a certain action TERM 31 logic bomb DEFINITION 31 a type of computer virus that lies in wait for unsuspecting computer usersto perform a triggering operation before executing its instructions TERM 32 Luddite DEFINITION 32 people feeling threatened by and protesting against or destroying technology TERM 33 malware DEFINITION 33 malicious software such as viruses, worms, or Trojan horses TERM 34 masquerading DEFINITION 34 misrepresenting oneself in order to steal equipment or to trick others into revealing sensitive information (aka social engineering) TERM 35 OLPC DEFINITION 35 One Laptop Per Child: an initiative to distribute very low- cost laptop computers to children in developing countries around the world TERM 46 time bomb DEFINITION 46 a type of computer virus that lies in wait for a specific date before executing its instructions TERM 47 Trojan horse DEFINITION 47 destructive computer code whose instructions remain hidden to the user because the computer appears to function normally but, in fact, is performing underlying functions dictated by the intrusive code TERM 48 vishing DEFINITION 48 phone scams that attempt to defraud people by asking the to call a bogus telephone number to "confirm" their account information; aka voice fishing TERM 49 warez DEFINITION 49 slang term for stolen proprietary software that is sold or shared for free over the Internet TERM 50 watermark DEFINITION 50 a digital or physical mark that is difficult to reproduce; used to prevent counterfeiting TERM 51 Web vandalism DEFINITION 51 the act of defacing Web sites
Docsity logo



Copyright © 2024 Ladybird Srl - Via Leonardo da Vinci 16, 10126, Torino, Italy - VAT 10816460017 - All rights reserved