Full Transcript

[Acceptable Use Policy]- A set of policies that list certain rules of behavior and explain the consequences of breaking those rules. [Anti-Virus Program]- A software utility program designed to identify and destroy viruses. [Antimalware Program]- A software utility program designed to identify and...

[Acceptable Use Policy]- A set of policies that list certain rules of behavior and explain the consequences of breaking those rules. [Anti-Virus Program]- A software utility program designed to identify and destroy viruses. [Antimalware Program]- A software utility program designed to identify and destroy malware. [Assumption]- Something that is accepted as being true even if there is no factual evidence. [Catfishing]- The act of pretending to be someone else in order to trick or defraud someone. [Censor]- Blocking content deemed inappropriate. [Citation]- A reference to a source that gives credit to the source and provides the tool a reader needs to locate the source on their own. [Commercial Software]- Copyrighted software that must be purchased before it can be used. [Computer Crime]- Any act that violates state or federal laws involving the use of a computer. [Confidentiality]- Keeping information private. [Cookie]- Small files that store identification information stored on a hard drive by a website that the user visits. [Copyright]- The right to control the use of creative, literary, or artistic work. [Copyrighted Software]- Software that is bought before use. [Counterfeiting]- Creating fake copies that look authentic and are sold as genuine. [Creative Commons License]- A license that lets copyright holders make some of their work available for public use while letting them retain other parts of their work. [Cyberbully]- Someone who uses technology to bully someone else. [Cybercrime]- The use of the internet or private networks to violate state or federal law. [Digital Divide]- The educational and economic divide that exists between people who have access to technology and those who do not. [Fair Use Doctrine]- The use of copyrighted material in a review, research, schoolwork, or professional publication, which does not necessarily require permission from the owner of the material. [Fire Wall]- A filtering system that opens or blocks programs and ports on a computer to keep data from entering a network. [Freeware]- Copyrighted software given away for free. [Intellectual Property]- Someone's creative, literary, or artistic work. [Intellectual Property Agreement]- A legal contract between or among various parties for the purchase and sale of intellectual property rights. [Multifactor Authentication]- The use of two or more verification factors to access a resource, such as a smartphone, computer, tablet, or website. [Netiquette]- An informal set of rules for proper behavior online. [Non-Disclosure Agreement]- A contract that prohibits an employee from sharing proprietary information. [Objectively]- Balanced and fair. [Open-Source Software]- Software for which the open-source code is made available to the public. [Packet Sniffers]- A program that examines data streams on networks to find information such as passwords and credit card numbers. [Passphrase]- A phrase used to gain access to a computer system or network, usually known only to the user and the administrator. [Patent]- The exclusive right to make, use, or sell a device or process. [Phishing]- A method by which cyber criminals lure users to revealing account codes and passwords by pretending to be legitimate websites. [Plagiarism]- Illegal copying of a creative material owner by another person. [Propaganda]- Misleading information used out of context in order to influence thinking. [Proprietary Information]- Information owned by a company that is not available to the public. [Proprietary Software]- Copyrighted software that you must buy before using. [Public Domain]- A category of intellectual property not subject to copyright laws. [Public Domain Software]- A program distributed for free without a copyright [Scanning]- A type of cybercrime that uses programs to try different passwords until one works. [Shareware]- Copyrighted software that can be sampled before purchase. [Social Engineering]- Ways of influencing someone to do something that may not be in their best interest. [Software License]- A legally binding agreement between the software producer and the user that specifies the terms of use and defines the rights of both parties. [Software Piracy]- The illegal copying of computer programs. [Spoof]- To use a false IP or email address. [Strong Password]- A password that uses a combination of at least eight random letters, numbers, and symbols so it\'s difficult for a hacker to guess. [Superzapper]- A program that accesses data by avoiding security measures. [Timebomb]- A computer virus programmed to perform a task, often at a specific date and time. [Trademark]- A symbol that indicates a brand or brand name is legally protected and can't be used by other businesses. [Trapdoor]- A type of virus that enables an unauthorized user (usually a hacker) to secretly gain access to a computer. [Trojan Horse]- A type of malware designed to look harmless but allows unauthorized access to your computer. [Virtual Private Network]- A private network set up through a public network. [Virus]- A type of malware or harmful code, that can copy itself and spread through software. [Work Ethics]- The ability to show respect to everyone around you while you perform your responsibilities as best as you can. [Worm]- A computer virus that spreads over a network without user execution.