The Internet: Vocab Pt2
Across
- 6. A law that grants the creator of an original work exclusive rights to its use, distribution, and sale
- 8. Protocols for encrypting/decrypting information. Most cybersecurity breaches happen due to human error, not software bugs.
- 9. Confirms the identity and authenticity of a website.
- 11. When multiple paths exist between two points. This improves reliability and makes the internet fault tolerable. Makes the routing system scalable.
- 12. The usage of deceptive emails and websites to maliciously gather personal information
- 16. Completes multiple tasks at a time, simultaneously.
- 18. The process of sending data between two computers on the internet. The data is sent through routers that determine the route.
- 19. A type of asymmetric key encryption. There’s one key that encrypts the information and there is a different key that decrypts the information.
Down
- 1. Identity theft, stealing money, stealing private information, controlling private computers.
- 2. A protocol that standardizes the language for talking to web servers to send and receive web pages, or HyperText information (HTML pages).
- 3. Anonymity describes situations where the acting person’s identity is unknown.
- 4. Censorship is the suppression of words, images, or ideas that are “offensive.”
- 5. Generally comprises data that is created by, or prepared for, electronic systems and devices such as computers, screens, calculators, communication devices and so on, and can be stored on those devices or in the Cloud
- 7. Allows for sending MULTIPLE packets between two computers. TCP checks that all packets arrived and can be put back in the proper order. The metadata must include a destination IP address, a from IP address, the message size and the packet order number.
- 10. Refers to programs that are executed sequentially – once through, from start to finish, without other processing executing.
- 13. The units of data that are sent over the network.
- 14. Pretending to be a DNS name resolver. Feed your computer the wrong IP address for a given website, and your browser now goes to a false website.
- 15. Distributed Denial of Service attack. Spam a web server with so many requests so close together that it crashes. Sometimes spitting out valuable information as it crashes.
- 17. The digital divide is a gap between those who have access to digital technology and those who don’t.