Front | Back |
Biometric Security Measures
|
A high-level method of security that matches a fingerprint, voice pattern, or the iris or retina of the eye to the entry originally stored in the system
|
Filtering
|
Process that can be used to cut down on or eliminate most junk mail
|
Hoax
|
An attempt to deceive an audience into believing something false is real
|
Fraud
|
Dishonestly obtaining money, property, information, or other things of value, or to cause loss.
|
Logic Bomb
|
Virus triggered by the appearance or disappearance of specified data
|
Netiquette
|
Refers to the good manners and proper behaviors when communicating through electronic media
|
Phishing
|
Using e-mail messages for personal information scams
|
Pyramid Schemes
|
Illicit business model where profits are based on the investor’s ability to recruit other individuals who are enrolled to make payments to their recruiters
|
RDF Summary
|
Format originally developed to facilitate the syndication of news articles and now widely used to share the contents of blogs
|
Spam
|
Junk e-mail
|
Tagging
|
Used in blogs and other informational sites to simplify the search process
|
Teleconferencing
|
A telecommunications system that permits the live exchange and sharing of information between two or more people
|
Time Bomb
|
A virus that does not cause its damage until a certain date or until the system has been booted a certain number of times
|
Trojan Horse
|
A virus that does something different from what it is expected to do
|
Urban Legend
|
Stories that at one time could have been partially true, but have grown from constant retelling into a mythical yarn
|