Ethical Hacking
Privacy
Surveillance
Piracy
Cyber-warfare
100

the use of information technology to gain unauthorized access to computer systems or password-protected sites

What is Cybertrespass

100

The notion that individual and corporate users are surrounded by technologies which collect user data as these technologies are incorporated into more everyday devices.

What is Ubiquitous Computing

100

The obligation a rational individual has to their moral code or system.

What is Moral Responsibility

100

An area of uncertainty where the norms and laws are not yet clear or resolved, often because the problem which is being address is new and/or novel.

What is Grey Area

100

The territory in which legal decisions can be said to be valid, and where legal authority can be extended and enforced.

What is Jurisdiction

200

the use of information technology to unleash programs that disrupt the operations of computer networks or corrupt data

What is Cybervandalism

200

A theory which suggests that people can rationally decide to ‘trade’ privacy or their personal information in return for a specific payoff

What is Privacy Calculus

200

A firm or agency which is legally and ethically responsible for storing and safeguarding personal and corporate user data and making decisions regarding the release and sharing of that data with others.

What is Data Trustee

200

The notion that the originator of an idea owns that idea. He or she is entitled to determine how it is used and to be compensated for its use.

What is Intellectual Property

200

Hackers who perform illegal or illicit operations with the intent to harm or destroy.

What is Black Hat Hacker

300

the use of deception for personal gain in online business transactions by assuming a false online identity or by altering or misrepresenting data

What is Computer Fraud

300

Revealing someone’s personal information publicly, without their knowledge or consent.

What is Doxing

300

The ability to act as an individual with free will and without being coerced or controlled by another.

What is Autonomy

300

Claiming another person’s ideas or intellectual property as your own.

What is Plagiarism

300

A military tactic in which defenders can launch an automatic counterattack against any suspected incursion or attack without waiting for authorization or permission.

What is Active Cyberdefense

400

the execution of politically motivated hacking operations intended to cause grave harm that is, resulting in either loss of life or severe economic loss or both.

What is Cyberterrorism

400

The use of encryption protocols to ensure that all users of a system or all participants in a transaction are who they say they are. Usually carried out through the issuance of certificates.

What is Authentication

400

The disparate application of surveillance primarily on the lower classes of society or some other minority group.

What is Differential Surveillance

400

Practices by which people upload, download, share, distribute or transmit media or data protected by copyright.

What is Piracy

400

Activities of warfare taking place in cyberspace or attacks on conventional targets waged through the use of cyber assets.

What is Cyberwarfare

500

A form of sanctioned hacking in which hackers carry out activities aimed at identifying flaws in computer systems, and are rewarded by defending systems for their efforts.

What is Bug Bounty Program

500

Methods that allow online users to protect the privacy of their personal information.

What is (PET)

Privacy Enhancing Technologies

500

Legal consent to an action with knowledge of possible consequences.

What is Informed Consent

500

The number of pirated software units divided by the total number of software units put into use, or the percentage of software acquired illegally.

What is Piracy Rate

500

Protocols for limiting incursions and damage caused by attacks without having an active counterattack protocol.

What is Passive Defense