cueFlash

Glossary of cis chap 5

Start Studying! Add Cards ↓

the state of being concealed or free from unauthorized intrusion
privacy
the rights of individuals and companies to control how information about them is collected and used.
information privacy
small text files that are stored on your hard drive by the Web server
cookies
usually very small image on a Web page that transmits data about a Web page visitor back to the Web page's server.
web bugs
any software installed without the user's knowledge that secretly gathers information about the user and transmits it to advertisers
spyware
contain data about people and their buying habits
marketing databases
contain information about individuals
government databases
collecting a variety of in depth information about an individual
electronic profiling
unsolicited email sent to a large group of individuals at one time and is the electronic equivalent of junk mail
spam
sorts your incoming email messages
email filter
blocking access to web sites containing objectionable material
internet filtering
software that records keystrokes, programs used, or otherwise monitors the activity a computer is used for.
computer monitoring software
monitoring system used by the FBI to retrieve Internet traffic from a suspect's PC.
carnivore
using cameras to monitor the activities of individuals
video surveillance
the ability of one computing device on a network to locate and identify another device on the same network and determine its status
presence technology

Add Cards

You must Login or Register to add cards