Exam 9: Privacy, Security, and Ethics
Describe spyware and computer monitoring software.
The most dangerous type of privacy threat comes in the form of spyware. The term spyware is used to describe a wide range of programs that are designed to secretly record and report an individual's activities on the Internet. Some of these programs can even make changes to your browser in order to deceive you and manipulate what you see online. Computer monitoring software, also known as keystroke loggers, is perhaps the most invasive and dangerous type of spyware. These programs record every activity and keystroke made on your computer system, including credit card numbers, passwords, and e-mail messages. Computer monitoring software can be deposited onto your hard drive without your knowledge by a malicious website or by someone installing the program directly onto your computer. While such software is deadly in the hands of criminals, it can be legally used by companies monitoring employees or law enforcement officials who are collecting evidence.
Spy removal programs are designed to detect and remove various types of privacy threats.
True
_______ is the process of coding information to make it unreadable except to those who have a special piece of information known as a key.
Encryption, Encrypting
Small data files that are deposited on a user's hard disk when they visit a website are called _______.
Which type of program would likely be used by investigators to record a potential suspects' Internet activities?
_______, a privacy issue, relates to the responsibility of controlling who is able to use data.
A _______ attack uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account.
_______-party cookies store information about the current session, your general preferences, and your activity on the website.
It is highly likely that each one of us has an electronic profile created by information resellers.
Which among the following is a way to shut down an ISP or website?
_______ is representing some other person's work and ideas as your own without giving credit to the original source.
_______ bugs are invisible images or HTML code hidden within a web page or e-mail message and are used to transmit information without your knowledge.
Computers infected by a virus, worm, or Trojan horse that allows them to be remotely controlled for malicious purposes are called _______.
A _______ Wi-Fi hotspot imitates a legitimate free Wi-Fi hotspot in order to capture personal information.
The most significant concerns for implementation of computer technology involve _______, security, and ethics.
Web bugs are usually hidden within the HTML code for a web page or in an e-mail message as an invisible image.
As a security buffer, all electronic communications coming into and leaving a corporation must be evaluated by the _______.
Corporations often use this to prevent copyright violations.
This uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account.
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)