0% found this document useful (0 votes)
449 views4 pages

CSC Quiz 2

The document summarizes key terms related to privacy and computer crimes in a table format. It provides 30 terms across two topics - privacy and computer crimes. For each term it lists the alphabet, definition, and explanation. This allows the reader to quickly review important concepts and their meanings in these two important areas related to technology and security.

Uploaded by

Jaya Malathy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
449 views4 pages

CSC Quiz 2

The document summarizes key terms related to privacy and computer crimes in a table format. It provides 30 terms across two topics - privacy and computer crimes. For each term it lists the alphabet, definition, and explanation. This allows the reader to quickly review important concepts and their meanings in these two important areas related to technology and security.

Uploaded by

Jaya Malathy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

CSC1002D

Quiz 2
Topic : Privacy

No Terminologies Alph Explanation Answer


a No
Example 5C
1 Accessibility Privacy A Analyzing data to determine characteristics
of people most likely to engage in a certain
behavior.
2 Anonymity B any information relating to an individual
person.
3 Computer matching C collection of personal information about a
user without the user’s knowledge.
4 Computer profiling D Combining and comparing information
from different databases (using ic number,
for example) to match records.
5 Data mining E controlling/restricting access to one’s
personal information
6 Decisional Privacy F Means to communicate without disclosing
one’s identity.
7 Informational Privacy G Non-Interference
8 Informed consent H Non-Intrusion
9 Informed Consent - opt in I Person must request (usually by checking a
box) that an organization not use
information.

10 Informed Consent - opt J Searching and analyzing masses of data to


out find patterns and develop new information
or knowledge.
11 Invisible information K The collector of the information may use
gathering information only if person explicitly
permits use (usually by checking a box).

12 Personal information L Use of personal information for a purpose


other than the purpose for which it was
collected/provided.
13 Secondary use M users being aware of what information is
collected and how it is used.
Topic : Computer Crime
N Alpha Answer
O
Example D3
1 Black hat A Computer-based activities that violate the law
hackers
2 Boot sector B Crimes committed through the Internet
viruses
3 Computer C Area of law dedicated to computer crime
crimes
4 computer worm D Engages in “non-malicious” forms of hacking.

5 Cookie E Engages in acts of theft and vandalism, once they


Poisoning gain access to a computer.
6 Counter Hacking F Hackers can use the computers of innocent
persons as “host computers” to initiate their
attacks.
7 Cyber G using cybertechnology in unauthorized ways to .
Harassments reproduce copies of proprietary software and
proprietary information
8 Cyberbullying H using cybertechnology to gain or to exceed
unauthorized access
9 Cybercrimes I using cybertechnology to unleash one or
more programs that disrupt the transmission of
electronic information across one or more
computer networks
10 Cyberlaw J Concealed inside a program that can harm or
destroy files and spreads through email
attachments
11 Cyberpiracy K Refers to the dangerous actions a virus performs.
12 Cybertrespass L execute each time you start the computer
13 Cybervandalism M spam text message sent via instant messaging
service
14 Data Diddling N a piece of code intentionally inserted into
a software system that will set off a malicious
function when specified conditions are met.
15 Distributed O A piece of code whose detonation is triggered by
Denial-of-servic a timer.
e Attacks
16 DoS attack P is a standalone malware computer program that
replicates itself in order to spread to other
computers.
17 Dumpster Diving Q A scam where an official-looking email is sent to
an unsuspecting user to try to trick them out of
their username, password or other information. 
18 Forgery R planting false Internet addresses in the tables on a
DNS that lead the browser to a counterfeit site set
up by identity thieves.
19 Libel S Method of attacking a database-driven Web
application with improper security
20 Logic Bomb T The modification of cookies that are put on your
computer by an attacker to gain information
about a user.
21 Payload U attacker harasses or threatens the victim using
electronic communication such as email, IM’s,
chat rooms, discussion groups, etc. (either one is
adult)
22 Pharming V attacker harasses or threatens the victim using
electronic communication such as email, IM’s,
chat rooms, discussion groups, etc. (involving
minor)
23 Phishing W Publication of false statements about a person or
business that results in injury to the person or
business
24 Pod Slurping X act of searching for Wi-Fi wireless networks by a
person usually in a moving vehicle, using
a laptop or smartphone. 

25 SPIM Y unauthorized download of data from a computer


to a small device with storage capacity, such as a
flash drive or an iPod or otherMP3 player.
26 SQl Injection Z Disgruntled employees goes through a trash to
find information they can steal
27 Time Bomb AA Illegal modifying of data
28 Virus AB An act to alters documents/ falsifies documents
saved in electronic form
29 Wardriving AC to disrupt a server’s ability to respond to its
clients
30 White hat AD DoS attack launched from many computers
hackers

You might also like