the data that are intentionally released onto the web by an individual
active digital footprint
a non-physical, intangible creation that has value
intellectual property
having control over our personal information and who has access to it
Privacy
malicious software that harms computers and systems
Malware
when human characteristics are used to measure something, such as one’s identity
Biometrics
the data that are unintentionally released onto the web by an individual; also referred to as a passive digital footprint
data exhaust
a license that gives the holder the exclusive right over selling, making, or using an invention
patent
We have the right to keep our bodily functions, characteristics, biometrics, and genetic codes private.
Privacy of the person
type of malware that secretly monitors and records users’ activities
spyware
protects against criminals and the unauthorized, illegal use of electronic data; also known as electronic information security or information technology security
cybersecurity
the data that are unintentionally released onto the web by an individual
passive digital footprint
a secret about processes, formulae, devices, or tools that give a company a competitive edge because they provide economic value
trade secret
type of malware that locks users out of their system or device, and forces them to pay the attacker a ransom to gain access
ransomware
where communication through technology occurs
cyberspace
the benefit and interests of all
common good
the economy that is based on the online connections among businesses, people, devices, data, systems, and processes
digital economy
type of malware that tricks the user into allowing access to the system or computer, by posing as a different type of file
trojan horse
crime that happens through the use of the internet, networks, networked devices, or technology
cybercrime
the rights and responsibilities of technology users to experience and promote positive online experiences for the common good
digital citizenship
property rights that are assigned to the holder or owner that gives the holder a monopoly over the property and prevents others from using, copying, imitating, or duplicating the intellectual property unfairly
intellectual property rights
weakness that puts a system or computer at risk
vulnerability
proving or showing that something is true
Authentication
the legal right given to organizations to exclusively use names, brands, and signs that identify their products, services, and companies
type of malware that infects a computer or system, and then replicates itself after being triggered by the host
virus
protects networks from intruders.
Network Security
These protect creative and intellectual works, such as art, literary works, and source codes of software programs
Copyrights
type of malware that infects a system, similar to a virus, but it acts independently and does not need to be triggered
worm