Time: -workflow. Resources: -Hardware / Software Regulations: -design data to be protected Security: -passwords Ethical & Moral Concerns: -avoid bias and misuse of data.
12 of 25
what is functionality?
how all of the aspects work/function
13 of 25
what is usability?
how easily the user can use it
14 of 25
what is accessibility?
is it accessible to users of varied abilities and needs
15 of 25
what is adware?
Advertising software: shows banners or pop-ups when online
16 of 25
what is a bot?
Web Robot: gains control over your computer
17 of 25
what is a bug?
A mistake or error in a software program
18 of 25
what is ransomware?
Can block access to a system until money is paid
19 of 25
what is a rootkit?
Software tools allows access to your computer without being detected
20 of 25
what is a Trojan horse?
Used by hackers it disguises itself as something else
21 of 25
what is a virus?
Code copies itself to corrupt a system/destroy data
22 of 25
what is a worm?
Worms its way across computers leaving a copy in the memory of each one
23 of 25
what is spyware?
Collects personal data / monitors browsing activity
24 of 25
Types of social engineering
Pretexting, Baiting, Phishing, Quid pro quo, Tailgating or piggybacking, Shoulder surfing
Comments
No comments have yet been made