I am Confidentiality, Integrity, and Availability.
I am the network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these things to connect and exchange data.
What is the Internet of Things?
A law that grants the creator of an original work exclusive rights to its use, distribution, and sale
how company’s use your data
What is Data Privacy?
attempting to find computer security vulnerabilities and exploit them for personal financial gain or other malicious reasons
What is black hat hacking?
I am The assurance that systems and data are accessible by authorized users when and where needed.
What is Availability?
I am the Protection of computer systems, networks, and data from digital attacks
What is Cybersecurity?
Objects in the public domain are not subject to copyright laws, and thus may be freely used by the general public.
What is a public domain?
protecting your data online
What is data security?
a computer security specialist who breaks into protected systems and networks to test and assess their security
What is white hat hacking?
Aims at ensuring that information is protected from unauthorized or unintentional alteration.
is a type cyber attack that threatens to publish the victim’s data or block access to it unless a ransom is paid.
What is Ransomware?
laws protect the creator so that no one else can use the work as their own. The original creator must get the credit.
What are copyright laws?
I secure data transfer protocol when on the internet
HTPPS
someone who seeks to break through defenses and exploit weaknesses in a computer system or network.
What is a Hacker?
I am The protection of information from people who are not authorized to view it.
Confidentiality
Identity theft, stealing money, stealing private information, controlling private computers.
What is Cyber crime?
Cite all sources to ensure that the original creator receives credit for the work.
What is it to protect creators rights?
Legal document outlining how a company can collect and use your data
What is privacy policy?
Yes or No? Hackers may be allowed to attempt to hack into a system to discover vulnerabilities that can then be fixed.
Yes
Students engage in positive, safe, legal and ethical behavior when using technology, including social interactions online or when using networked devices.
Relating to computers or computer networks
What is Cyber?
All rights reserved, Some rights reserved, and public domain
What are some examples of Copyright Licenses?
typically longer in length, contain a combination of lower case letter, upper case letter, special characters, punctuation, and numbers
What are complex passwords?
a person can face felony charges including prison time and high fines.
What is hacking illegally?