2: Online Safety, Security, and Rules of Netiquette Flashcards

1
Q

refers to online security or safety of people and their information in the internet

A

Internet Safety

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

network etiquette and do’s and don’ts of online communication

A

Netiquette

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Security Requirement Triad

A

CIA Triad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CIA Triad

A

Confidentiality
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

3 types of System Intruder

A

Masquerader
Misfeasor
Clandestine User

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

individual who is not authorized to use the computer and penetrates a system’s access controls to exploit a legitimate user’s account

A

Masquerader

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

legitimate user who accesses data, programs, or resources for which such access is not authorized, or who is authorized but misuses their privileges

A

Misfeasor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

one who seizes supervisory control of the system and uses this control to evade auditing and access controls or to suppress audit collection

A

Clandestine User

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

8 Internet Threats

A
Malware
Virus
Spam
Phishing
Worms
Trojan
Spyware
Adware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

stands for malicious software

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

malicious program designed to transfer from one computer to another in any means possible

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

unwanted email mostly from bots or advertisers

A

Spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

acquires sensitive personal information like passwords and credit card details

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

malicious program designed to replicate itself and transfer from one file folder to another and also transfer to other computers

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

malicious program designed disguised as a useful program but once downloaded or installed, leaves your PC unprotected and allows hackers to get your information

A

Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

program that runs in the background without you knowing it and has the ability to monitor what you are currently doing and typing through key logging

A

Spyware

17
Q

program designed to send advertisements, mostly pop-up

A

Adware

18
Q

4 Search categories

A
  1. Keyword Searching
  2. Boolean
  3. Question
  4. Advanced
19
Q

enter terms to search

A

Keyword searching

20
Q

common words ignored in keyword searching

A
that
to 
which
a
the
21
Q

can be used to include or exclude a word in keyword searching

A

+ / -

22
Q

will include sites where both of the combined words are found

A

AND

23
Q

requires at least one of the terms is found

A

OR

24
Q

searches for the first term and excludes sites that have the second term

A

NOT

25
Q

can be entered in the search field of a search engine

A

Question

26
Q

features are offered on many engines by going to an “Advanced Search” page and making selections

A

Advanced

27
Q

effective in narrowing search

A

Advanced