Ch. 5

Types of devices that should comply with the Energy Start program
Personnel computers, display devices, printers
Do secure sites use digital certifications in conjunction with security protocols
yes
Someone who uses the internet to destroy/damage computers for political reasons
cyberterrorist
Term for restricting access to certain material on the internet
Content filtering
Group/ Organization that protect minors from inappropriate internet content at schools and libraries
Children internet protection act
Any event or action that could cause any loss or damage to computer or mobile device software, hardware, data, information, or processing ability
Digital Security Risk
Used by internet advertising firms to collection information about users web browsing habits
Spyware
Term for making a copy of a file
backup
Are all devices connected to the internet susceptible to mobile malware
yes