The document summarizes key terms related to privacy and computer crimes in a table format. It provides 30 terms across two topics - privacy and computer crimes. For each term it lists the alphabet, definition, and explanation. This allows the reader to quickly review important concepts and their meanings in these two important areas related to technology and security.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
449 views4 pages
CSC Quiz 2
The document summarizes key terms related to privacy and computer crimes in a table format. It provides 30 terms across two topics - privacy and computer crimes. For each term it lists the alphabet, definition, and explanation. This allows the reader to quickly review important concepts and their meanings in these two important areas related to technology and security.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4
CSC1002D
Quiz 2 Topic : Privacy
No Terminologies Alph Explanation Answer
a No Example 5C 1 Accessibility Privacy A Analyzing data to determine characteristics of people most likely to engage in a certain behavior. 2 Anonymity B any information relating to an individual person. 3 Computer matching C collection of personal information about a user without the user’s knowledge. 4 Computer profiling D Combining and comparing information from different databases (using ic number, for example) to match records. 5 Data mining E controlling/restricting access to one’s personal information 6 Decisional Privacy F Means to communicate without disclosing one’s identity. 7 Informational Privacy G Non-Interference 8 Informed consent H Non-Intrusion 9 Informed Consent - opt in I Person must request (usually by checking a box) that an organization not use information.
10 Informed Consent - opt J Searching and analyzing masses of data to
out find patterns and develop new information or knowledge. 11 Invisible information K The collector of the information may use gathering information only if person explicitly permits use (usually by checking a box).
12 Personal information L Use of personal information for a purpose
other than the purpose for which it was collected/provided. 13 Secondary use M users being aware of what information is collected and how it is used. Topic : Computer Crime N Alpha Answer O Example D3 1 Black hat A Computer-based activities that violate the law hackers 2 Boot sector B Crimes committed through the Internet viruses 3 Computer C Area of law dedicated to computer crime crimes 4 computer worm D Engages in “non-malicious” forms of hacking.
5 Cookie E Engages in acts of theft and vandalism, once they
Poisoning gain access to a computer. 6 Counter Hacking F Hackers can use the computers of innocent persons as “host computers” to initiate their attacks. 7 Cyber G using cybertechnology in unauthorized ways to . Harassments reproduce copies of proprietary software and proprietary information 8 Cyberbullying H using cybertechnology to gain or to exceed unauthorized access 9 Cybercrimes I using cybertechnology to unleash one or more programs that disrupt the transmission of electronic information across one or more computer networks 10 Cyberlaw J Concealed inside a program that can harm or destroy files and spreads through email attachments 11 Cyberpiracy K Refers to the dangerous actions a virus performs. 12 Cybertrespass L execute each time you start the computer 13 Cybervandalism M spam text message sent via instant messaging service 14 Data Diddling N a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met. 15 Distributed O A piece of code whose detonation is triggered by Denial-of-servic a timer. e Attacks 16 DoS attack P is a standalone malware computer program that replicates itself in order to spread to other computers. 17 Dumpster Diving Q A scam where an official-looking email is sent to an unsuspecting user to try to trick them out of their username, password or other information. 18 Forgery R planting false Internet addresses in the tables on a DNS that lead the browser to a counterfeit site set up by identity thieves. 19 Libel S Method of attacking a database-driven Web application with improper security 20 Logic Bomb T The modification of cookies that are put on your computer by an attacker to gain information about a user. 21 Payload U attacker harasses or threatens the victim using electronic communication such as email, IM’s, chat rooms, discussion groups, etc. (either one is adult) 22 Pharming V attacker harasses or threatens the victim using electronic communication such as email, IM’s, chat rooms, discussion groups, etc. (involving minor) 23 Phishing W Publication of false statements about a person or business that results in injury to the person or business 24 Pod Slurping X act of searching for Wi-Fi wireless networks by a person usually in a moving vehicle, using a laptop or smartphone.
25 SPIM Y unauthorized download of data from a computer
to a small device with storage capacity, such as a flash drive or an iPod or otherMP3 player. 26 SQl Injection Z Disgruntled employees goes through a trash to find information they can steal 27 Time Bomb AA Illegal modifying of data 28 Virus AB An act to alters documents/ falsifies documents saved in electronic form 29 Wardriving AC to disrupt a server’s ability to respond to its clients 30 White hat AD DoS attack launched from many computers hackers