Information Technology (IT)
The study or use of systems for storing, retrieving, and sending information
Cybercrime
A criminal act committed primarily through the use of a computer system
Phishing
Sending emails to lure people into revealing their personal information or to take an
action
Hacking
unauthorized access, modification, or use of an electronic device or some element of a
computer system
Social Networking
process by which we make connections with others
social media
online tools and sites that allow netoworking
Cloud Storage
allows you to save files in storage and then access them on the Cloud
Cloud Computing
is a type of Internet-based computing that provides shared computer processing
resources and data to computers and other devices on demand
intellectual property
an idea, invention, or process that derives from the work of the mind or intellect
copyright
protection given to the creator of songs, computer programs, books, and other creative
works
copyright infringement
When a copyrighted work is reproduced, distributed, performed, or publicly displayed
work without the permission of copyright owner
patent
creates protection for someone who invents a new product or process
Trademark
a word, phrase, logo, shape or sound that identifies a source of goods or services that
must be protected by an organization
Digital Rights Management
a strategy designed to prevent illegal distribution of movies, music, and other digital
content
public domain
A work of authorship that is not under copyright protection and can be used freely
without permission
plagarism
taking someones ideas or writing and offering them as your own
digital divide
The gap between those who have access to the Internet and technology and those who
do not
mobile commerce
, The process of buying, selling, or exchanging products, services, or information via
phone
E-commerce (electronic commerce)
The process of buying, selling, or exchanging products, services, or information via
internet
black hat hackers
A hacker that breaks into a system for malicious reasons
white hat hackers
A person who hacks into a system for non-malicious purposes
Denial of service attack
attack which a botnet overwhelms websites, mail servers, or other internet locations and
a user cannot access the site
Spam
irrelevant or inappropriate messages sent on the Internet to a large number of recipients
malware
malicious software
Spyware
malware that can monitor and record user activities
computer cookies
A text file which a website can store on its visitors' hard drives. Can remember
passwords, tracks number of visitors
identity theft
when a criminal or group uses the identity of unknown person
Social Engineering
manipulation of people into releasing information or performing a task that violates
security protocols
virus
software that attaches or adds itself to other software; can replicate itself
anti-virus software
a program that finds and removes viruses from a computer
Passwords
a method of controlling access to confidential patient information.
Choose strong passwords, change passwords periodically, do not use the same
password for multiple purposes
privacy policy
Document that tells how personal data collected by a company will be used
artificial intelligence
the branch of computer science that attempts to develop computers that mimic human
thought and behavior
virtual reality
Illusion of reality through the use of software and perception changing devices
Augmented reality
the combination of a "real" objects overlaid with data, images, etc. that are not real
Excel
a spreadsheet written or tailored to meet specific needs
excel cell