G12 IT Social Implications

Cards (41)

  • A hacker is a person who explores computer systems and networks often with technical expertise to gain knowledge or find vulnerabilities for various purposes.
  • A cracker is a hacker who uses their skills to break into computer systems or networks with malicious intent such as unauthorized access or data theft.
  • A black hat hacker is an individual who uses their hacking skills for malicious activities such as exploiting vulnerabilities stealing data or causing harm.
  • A grey hat hacker is someone who operates between ethical and unethical hacking often exposing vulnerabilities but without malicious intent or permission.
  • A white hat hacker also known as an ethical hacker uses their skills to identify and fix security flaws in computer systems or networks with the owner's permission.
  • A virus author is an individual who creates and develops malicious software programs known as viruses with the intent to disrupt or damage computer systems.
  • A cybergang is a group of hackers or cybercriminals who collaborate to carry out coordinated attacks often targeting organizations or individuals for financial gain.
  • A spammer is a person or entity that sends unsolicited and often unwanted messages or advertisements typically through email to a large number of recipients.
  • Intellectual property refers to original creations of the mind such as inventions literary and artistic works designs or symbols protected by legal rights.
  • Identity theft is the fraudulent gaining and use of someone's personal information such as their name personal number or financial details for illegal purposes.
  • Phishing is a cybercrime technique where attackers impersonate legitimate entities often through email or websites to deceive individuals into revealing sensitive information.
  • Piggybacking refers to unauthorized access to a wireless network by using someone else's network connection without their knowledge or permission.
  • Botnets are networks of compromised computers or "bots" controlled by an attacker typically used for malicious activities such as distributed denial-of-service attacks.
  • Cyberbullying is the use of electronic communication such as social media or online platforms to harass intimidate or harm individuals or groups.
  • DDoS (Distributed Denial of Service) is a type of cyberattack where multiple compromised systems are used to flood a target's network or server causing a denial of service to legitimate users.
  • Script Kiddies are individuals with limited technical knowledge who use pre-existing scripts or tools to carry out hacking activities without a deep understanding of the underlying technology.
  • Blog: A website or web page where individuals or organizations regularly post informal articles or entries, in chronological order.
  • Really Simple Syndication: A technology that allows users to subscribe to website content, such as news articles or blogs, and receive updates in a standardized format.
  • Green Computing: The practice of using computers and IT resources in an environmentally friendly manner, focusing on reducing power consumption, electronic waste, and carbon emissions.
  • E-Waste: Discarded electronic devices and equipment, including computers, smartphones, and appliances, which can be harmful to the environment if not properly recycled.
  • Vampire Power: Also known as standby power or phantom load; the power consumed by electronic devices when they are turned off or in standby mode, often unnoticed by users.
  • Bug: An error, flaw, or unintended behavior in a software program or system that causes it to behave unexpectedly or not as intended.
  • Update: A modification to a software program or system intended to fix issues, improve functionality, or enhance security, usually released after the initial version.
  • Upgrade: The process of replacing a software program or hardware component with a newer or more advanced version to improve performance, features, or compatibility.
  • Patch: A small piece of software designed to fix specific issues (bugs or vulnerabilities) within a larger software program without requiring a complete update.
  • Service Pack: A comprehensive update or package of updates, patches, and enhancements for a software product, often released periodically to improve stability and security.
  • Decision Support System: A computer-based system that utilizes data analysis, modeling, and information retrieval to assist decision-making processes within an organization.
  • Expert System: A computer system designed to emulate the decision-making abilities of a human expert in a specific domain, providing expert-level advice and solutions.
  • Artificial Intelligence: The simulation of human intelligence in machines that are programmed to think and learn like humans, enabling them to perform tasks that typically require human intelligence.
  • Fuzzy Logic: A mathematical framework that deals with approximate or imprecise information, allowing for reasoning that works with probabilities in order to make a decision.
  • Knowledge-based System: Another name for an expert system.
  • Distributed Computing: A computing model where tasks are divided among multiple computers in a network, allowing them to work together on a problem, often improving processing speed and efficiency.
  • Information Overload: The state in which an individual is presented with more information than they can effectively process or manage.
  • Social Networking: The use of dedicated websites and applications to interact with other users, share content, and form virtual communities based on shared interests or connections.
  • Social Engineering: The manipulation of individuals into revealing confidential information, often involving psychological manipulation or impersonation techniques.
  • Wiki: A collaborative website that allows multiple users to create, edit, and organize content, fostering collaboration and knowledge sharing.
  • GUID: a unique reference number used in software applications to identify resources without ambiguity.
  • IP Address: A numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication.
  • Router Gateway Address: The IP address assigned to a router in a network, serving as the entry and exit point for data packets between the local network and external networks like the internet.
  • MAC Address: A unique identifier assigned to every networking device for communications on a computer network.