Desktop version

Home arrow Communication

  • Increase font
  • Decrease font

<<   CONTENTS   >>

Key Terms

Backdoor a backdoor generally circumvents security programs and provides access to a program, an online service, or an entire computer system. It can be authorized or unauthorized, documented or undocumented.

Consumer-generated content is digital content that is produced by self-publishers and sometimes picked up or referenced in traditional media.

Cybervetting is the process of reviewing and evaluating an employee’s or potential employee’s use of social media to determine if they have made posts that can harm law enforcement officers or agencies or compromise the prosecutorial process.

Open source intelligence is data and information that can be found in multiple sources including social media, websites, databases, libraries, and archives.

Personally identifiable information (PII) is information that can be used to distinguish or trace an individual’s identity, either alone or when combined with other personal or identifying information that is linked or linkable to a specific individual.

Theft of personal or financial data is the illegal obtaining of information that potentially allows someone to use or create accounts under another name (individual, business, or some other entity). Personal information includes names, dates of birth, social security numbers, or other personal information. Financial information includes credit, debit, or automated teller machine (ATM) card account numbers or personal identification number (PIN).

<<   CONTENTS   >>

Related topics