Data Mining correct answers process of searching through many records in one or more
databases looking for patterns or relationships
Collaborative Filtering correct answers algorithms draw upon information about the preferences
of a large number of people to predict what an individual may enjoy
Microtargeting correct answers Direct marketing based on data mining
Secondary Uses of Information correct answers Information collected for one purpose use for
another purpose
Census Records correct answers Questions to ensure every state has a fair representation,
questions steadily rise
Internal Revenue Service correct answers federal agency responsible for collecting income taxes
FBI National Crime Center Database correct answers Collection of databases related to various
crimes, > 39 million records
Provisions of USA Patriot Act correct answers After 9/11
-Federal law enforcement and intelligence officials with greater authority to monitor
communications
-Sec. of the Treasury has greater powers to regulate banks, preventing them from being used for
money laundering
-Greater border controls making it more difficult for terrorists to enter the United States
-Defining new crimes and penalties for terrorist activity
Criticisms of USA Patriot Act correct answers -Undermines 4th amendment rights
-allows police to use pen registers on the internet to track email addresses and URLs
-Allows for roving surveillance to be performed for the purpose of intelligence, and the
government does not have to prove that the person under investigation actually used the device
to be tapped.
-Searches and seizures without warrants
-Warrants issued without need for showing probable cause
IRS Audits correct answers - Computer matching of tax
form information with the information
provided by employers, banks, etc.
- DIF algorithm to score every tax return. Data mining to detect errors resulting in underpayment
of taxes or fraud.
Syndromic Surveillance Systems correct answers A data mining system that searches for patterns
indicated the outbreak of an epidemic or bioterrorism
-911 calls, ER visits, school absenteeism, purchase of prescription drugs, internet searches
, Profiling Issues correct answers -Government security agencies supposed to protect nation from
harm
-What if an erroneous profile characterizes an innocent citizen as a potential terrorist?
-Since the data being searched is so massive, it may be impossible to explain how an algorithm
has put someone on the watch list
-US Government's terrorist watch list now contains 1.5 million names
-How can innocent people clear their names?
5 methods for Obtaining Logins and Passwords correct answers -Eavesdropping (looking over
shoulder)
-Dumpster diving (looking through garbage)
-Social engineering (manipulation of the person inside an organization)
-Brute-force searches (try combinations of characters)
-Dictionary attacks (using list of words that commonly appear in passwords)
Sidejacking correct answers hijacking of an open Web session by capturing a user's cookie
giving the attacker the same privileges as the user on that Web site.
Viruses correct answers Piece of self-replicating code embedded within another program(host)
Worms correct answers -Self-contained programs
-Spreads through a computer network
-Exploits security holes in networked computers
-purpose is to simply propagate
Trojans correct answers Program with benign capability that masks a sinister purpose. When the
user executes the Trojan horse, the program performs the expected beneficial task and also
performing actions unknown to, and no in the best interests, of the user.
Ransomware correct answers Malware that stops you from using your computer or accessing
your data until you meet certain demands such as paying a ransom or sending photos to the
attacker, designed to extort money from victim
Rootkits correct answers A set of programs that provides privileged access to a computer
Spyware and Adware correct answers Spyware: Program that communicates over an internet
connection without user's knowledge or consent
Adware: Type of spyware that displays pop-up advertisements related to user's activity
Bots and Botnets correct answers Bot: A kind of backdoor Trojan that responds to commands
sent by a command-and-control program on another computer
Botnet: Collection of bot-infected computers controlled by the same command-and-control
program