The information about a particular person that exists on the Internet as a result of their online activity
the use of electronic communication to bully a person
Legal document outlining how a company can collect and use your data
any data that can be used to identify an individual, such as their name, address, or social security number
Information literacy is having the ability to find information, evaluate information credibility, and use information effectively.
A computer system able to perform tasks that ordinarily require human intelligence
a video or image of a person in which their face or body has been digitally altered so that they appear to be someone else, typically used maliciously or to spread false information.
A law that grants the creator of an original work exclusive rights to its use, distribution, and sale
The moral principle that governs a person's behavior.
refers to an external mechanism of control
A specific group of hackers who are motivated by their ideological views.
Have political motivations with the intent to harm, typically resulting in violence.
Sponsored by and funded by a government with the goal of giving their country a competitive advantage on a global scale.
The process of identifying a user and granting them access. Authentication is proving that someone is who they say they are.
A type of authentication that is similar to a password but longer and is usually a sentence or a series of words
(2FA) A type of multifactor authentication that typically combines something the user knows (like a password) with something the user has (like a mobile phone)
(MFA) An extra layer of authentication that requires two or more factors for authentication. Typically, these factors fall into three categories: something you know (password), something you have (such as a phone), or something you are (such as your fingerprint).
A form of authentication that uses an individual’s physical or behavioral characteristics to verify their identity
Tools that store and manage passwords for various accounts, generating strong passwords and auto-filling login credentials.
The Internet of Things (IoT) is the network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these things to connect and exchange data.
The protection of information from people who are not authorized to view it.
Aims at ensuring that information is protected from unauthorized or unintentional alteration.
The assurance that systems and data are accessible by authorized users when and where needed.
Ensures that one cannot deny having sent or received a message.
A flaw or weakness in a system or device.
The potential for loss when an attack happens.
A potential for a cybercriminal to exploit a vulnerability.
The process of enforcing policies and user privileges. Once a user is authenticated, they may only be authorized to access specific areas or may only have rights to perform specific tasks.
The process of measuring what is happening within the system. This is the final process of the AAA framework and ensures that there is a log of all actions within the network or system.
Any type of software that is designed to intentionally harm or damage a computer or network.
A type of malware that attaches itself onto a host program, such as a document. It can cause serious damage to files or an entire device.
A software that prevents users from accessing their files or network until a ransom is paid.
Once downloaded onto a user’s computer, the software secretly gathers information about a person or organization and sends it to the attacker.
A cybercrime in which a person is contacted by email, telephone or text message by someone who is posing as a legitimate company.
A network security device that monitors and filters incoming and outgoing network traffic.
A person or device that makes calculations, stores data, and executes instructions according to a program.
Programs that can be run on a computer
The primary software that runs applications and manages all the hardware, memory and other software on a computer.
The physical components of a computer
A circuit board with ports and sockets used to connect the main devices of a computer.
The core component of a device that accepts and executes instructions.
A fast type of computer memory which temporarily stores all the information your device needs right away.
A data storage device that uses magnetic storage and rapidly rotating disks to store and retrieve digital information.
Cloud computing is the on demand availability of computer system resources, especially data storage and computing power, without direct active management by the user.
Created when a collection of data is organized or structured.
Pulls meaning from information by analyzing the organized data and generating insights.
A collection of numbers or data points.
A computer program that helps us organize, manipulate, and analyze data.
The intersection of a row and a column.
A horizontal line of cells.
A vertical line of cells.
A built-in formula that performs specific calculations.
The practice or science of collecting and analyzing numerical data.
The central value between numbers.
The middle value in an ordered list.
The value that occurs the most.
A collection of numbers or data points.
This is when data is being accessed by a person or program.
This is when data is actively moving from one location to another.
This is when data is stored in a specific place that isn’t actively moving to other devices or networks.
A collection of data that is organized in a structured way.
A category of information.
A single entry in a database table.
A specific category of data within a record.
An electronic system that allows data to be easily accessed, updated, and manipulated.
The set of rules that define how commands and instructions are written.
A request for information from a database.
Bit means "binary digit". A bit is a single digit in a binary number. A bit can either be 0 or 1.
A byte is 8 bits.
Number system that has 2 digits, 0 and 1. This is how computers represent numbers at the base level.
A semiconductor device used to amplify or switch electronic signals and electrical power, functioning as an on/off switch in computing
The process of converting information or data into a specific format that can be understood or processed by a computer.
ASCII is the standard protocol for encoding text information as bits. The ASCII table assigns a unique binary number to every text character.
Unicode is a system that lets computers show and use all kinds of characters from different languages and writing systems around the world.
A kilobyte (kB) is 2^10 bytes (1024 bytes) of binary data.
A megabyte (MB) is 2^20 bytes (1024 kB) of binary data.
A gigabyte (GB) is 2^30 bytes (1024 MB) of binary data.
Images are made up of pixels, which are essentially a grid of values. Each value, or pixel, encodes the color at that position in the image.
The RGB encoding scheme allows us to encode colors as numeric data. It defines the amount of Red, Green, and Blue light in a pixel. Each color channel can have a value between 0 and 255.
A terabyte (TB) is 1024 GB of binary data.
A philosophy of making information and knowledge open and accessible to all people. A network of networks built on open, agreed upon protocols.
A network where devices are connected via physical cables.
A network where devices connect without physical cables, typically using radio waves.
The process of varying a signal to transmit data.
Undersea cables used for transmitting telecommunications signals across oceans.
A computer scientist known as one of the "fathers of the internet."
A new 128 bit version of the Internet Protocol.
The protocol that defines the payout of an an Internet address.
An agreed upon set of rules that outlines how to communicate or send information.
The original 32 bit IP protocol that was created in the 1980s.
The process of sending data between two computers on the internet. The data is sent through routers that determine the route.
Allows for sending MULTIPLE packets between two computers. TCP checks that all packets arrived and can be put back in the proper order. The metadata must include a destination IP address, a from IP address, the message size and the packet order number.
An access point that allows for network management and security configuration.
a system that will operate with no interruption when one or more of its components fail
When data is passed from one network segment to another.
The number of hops it takes for data to get to its final destination.
Advanced Research Projects Agency Network, precursor to the modern internet
UDP is often used in real-time applications where timely delivery of data is more important than the accuracy of delivery. UDP does not number the packets and it does not retransmit packets that are lost.
A float, or floating point value, is a numeric value that can have decimal level precision (ex: 3.14)
The way humans communicate with each other, like English, Spanish, or Mandarin.
A set of instructions (commands) and rules used to communicate with computers. Examples include Python, JavaScript, and HTML.
A way to classify the kind of information you can use in programming, like numbers, words, or true/false values.
Defining a function means to teach the computer a new command and explain what it should do when receiving that command.
Calling a function actually gives the command, so the computer will run the code for that function.
An algorithm is a set of steps or rules to follow to solve a particular problem.
Sequencing, or sequential execution, is step by step execution of instructions in the order they are given.
Repetition of instructions a specified number of times, or until a condition is met.
Using a condition to determine which part of an algorithm is executed.