Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Terminology and Definitions in Computer Science and Cybersecurity, Quizzes of Information Technology

Definitions for various terms related to computer science and cybersecurity, including bot herder, botnet, carding, cloning, computer crime, computer ethics, computer fluency, computer forensics, and more. These terms cover a range of topics such as hacking, cyberbullying, cyberstalking, cyberterrorism, and information privacy.

Typology: Quizzes

2010/2011

Uploaded on 05/08/2011

alimoherek
alimoherek 🇺🇸

95 documents

1 / 11

Toggle sidebar

Related documents


Partial preview of the text

Download Terminology and Definitions in Computer Science and Cybersecurity and more Quizzes Information Technology in PDF only on Docsity!

bot herder

computer criminal "owning" a botnet TERM 2

botnet

DEFINITION 2 collection of zombie computers used for destructive activities or spamming TERM 3

carding

DEFINITION 3 stealing credit card information for one's own use, or to sell TERM 4

cloning

DEFINITION 4 using scanners to steal wireless transmitter codes for cell phones, then duplicating the codes for illegal use TERM 5

computer crime

DEFINITION 5 the use of a computer to commit an illegal act

computer ethics

a broad range of issues and standards of conduct that have emerged through the use and proliferation of information systems TERM 7

computer

fluency

DEFINITION 7 the ability to independently learn new technologies as they emerge and assess their impact on one's work and life TERM 8

computer forensics

DEFINITION 8 the use of formal investigative techniques to evaluate digital information for judicial review TERM 9

computer literacy

DEFINITION 9 the knowledge of how to operate a computer TERM 10

copyright

DEFINITION 10 a form of intellectual property, referring to creations of the mind such as music, literature, or software

cracker

an individual who breaks into computer systems with the intention of doing damage or committing a crime TERM 12

cyber bullying

DEFINITION 12 the use of a computer to intentionally cause emotional distress to a person TERM 13

cyber harassment

DEFINITION 13 the use of a computer to communicate obscene, vulgar, or threatening content that causes a reasonable person to endure distress TERM 14

cyber stalking

DEFINITION 14 the use of a computer to repeatedly engage in threatening or harassing behavior TERM 15

cybersquatting

DEFINITION 15 the dubious practice of registering a domain name, then trying to sell the name to the person, company, or organization most likely to want it

cyberterrorism

the use of computer and networking technologies against persons or property to intimidate or coerce governments, individuals, or any segment of society to attain political, religious, or ideological goals TERM 17

cyberwar

DEFINITION 17 an organized attempt by a country's military to disrupt or destroy information and communications systems of another country TERM 18

data diddling

DEFINITION 18 a type of computer crime where the data going into or out of a computer is altered TERM 19

digital divide

DEFINITION 19 the gap between those individuals in our society who are computer literate and have access to information resources like the Internet and those who do not TERM 20

dumpster diving

DEFINITION 20 going through dumpsters and garbage cans for company documents, credit card receipts, and other papers containing information that might be useful for committing computer crimes

hacker

individual who gains unauthorized access to computer systems TERM 22

hacktivist

DEFINITION 22 cybercriminal pursuing political, religious, or ideological goals TERM 23

identity theft

DEFINITION 23 stealing another person's Social Security number, credit card number, and other personal information for the purpose of using the victim's credit rating to borrow money, buy merchandise, and run debts that are never repaid TERM 24

information accessibility

DEFINITION 24 an ethical issue that focuses on defining what information a person or organization has the right to obtain about others and how this information can be access and used TERM 25

information accuracy

DEFINITION 25 an ethical issue concerned with the authenticity and fidelity of information, as well as identifying who is responsible for informational errors that harm people

Information Age

a period of time in society when information became a valuable or dominant currency TERM 27

information privacy

DEFINITION 27 an ethical issue that is concerned with what information an individual should have to reveal to others through the course of employment or through other transactions such as online shopping TERM 28

information property

DEFINITION 28 an ethical issue that focuses on who owns information about individuals and how information can be transferred, sold, and exchanged TERM 29

IP

DEFINITION 29 intellectual property: creations of the mind that have commercial value TERM 30

Internet hoax

DEFINITION 30 a false message circulated online about any topic of public interest, typically asking the recipient to perform a certain action

logic bomb

a type of computer virus that lies in wait for unsuspecting computer usersto perform a triggering operation before executing its instructions TERM 32

Luddite

DEFINITION 32 people feeling threatened by and protesting against or destroying technology TERM 33

malware

DEFINITION 33 malicious software such as viruses, worms, or Trojan horses TERM 34

masquerading

DEFINITION 34 misrepresenting oneself in order to steal equipment or to trick others into revealing sensitive information (aka social engineering) TERM 35

OLPC

DEFINITION 35 One Laptop Per Child: an initiative to distribute very low- cost laptop computers to children in developing countries around the world

online predator

cyber criminal using the Internet to target vulnerable people, usually the young or old, for sexual or financial purposes TERM 37

patent

DEFINITION 37 type of intellectual property typically referring to process, machine, or material inventions TERM 38

patriot

hacker

DEFINITION 38 Independent citizens or supporters of a country that perpetrate computer attacks on perceived or real enemies TERM 39

phreaking

DEFINITION 39 crimes committed against telephone company computers with the goal of making free long distance calls, impersonating directory assistance or other operator services, diverting calls to numbers of the perpetrator's choice, or otherwise disrupting telephone service for subscribers TERM 40

piggybacking

DEFINITION 40 looking over a person's shoulder while they're using an ATM, cell phone, or other device in order to steal access information;aka shoulder-surfing

salami slicing

a form of data diddling that occurs when a person shaves small amounts from financial accounts and deposits them in a personal account TERM 42

shoulder-surfing

DEFINITION 42 looking over a person's shoulder while they're using an ATM, cell phone, or other device in order to steal access information TERM 43

social engineering

DEFINITION 43 misrepresenting oneself in order to steal equipment or to trick others into revealing sensitive information; aka masquerading TERM 44

software piracy

DEFINITION 44 a type of computer crime where individuals make illegal copies of software protected by copyright laws TERM 45

spoofing

DEFINITION 45 attempts to trick financial account and credit card holders into giving away their authorization information, usually by sending spam messages to millions of email accounts;aka phishing

time bomb

a type of computer virus that lies in wait for a specific date before executing its instructions TERM 47

Trojan horse

DEFINITION 47 destructive computer code whose instructions remain hidden to the user because the computer appears to function normally but, in fact, is performing underlying functions dictated by the intrusive code TERM 48

vishing

DEFINITION 48 phone scams that attempt to defraud people by asking the to call a bogus telephone number to "confirm" their account information; aka voice fishing TERM 49

warez

DEFINITION 49 slang term for stolen proprietary software that is sold or shared for free over the Internet TERM 50

watermark

DEFINITION 50 a digital or physical mark that is difficult to reproduce; used to prevent counterfeiting

Web vandalism

the act of defacing Web sites