Chap 5 Flashcards

1
Q

Netiquette

A

includes the code of acceptable behaviors
users should follow while on the Internet; that is, it is the conduct expected of individuals while online.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

set of legal and moral guidelines that
govern the use of technology, including computers,
mobile devices, information systems, and databases

A

Digital ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cyberbullying

A

a form of bullying that involves digital
devices and platforms such as social media sites, online forums, messaging apps, and email.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

one state that has attempted to define and
enact punishment for cyberbullying. Missouri statute
defines cyberbullying as bullying “through the
transmission of a communication, including but not limited to, a message, text, sound, or image by means of an electronic device.”

A

Missouri

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Distracted driving

A

driving a vehicle while
focusing on other activities, typically involving an
electronic device such as a cell phone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

a document that lists guidelines and repercussions
of using the Internet and other digital company resources, including network storage and email servers

distributed in part to reduce an organization’s
liability and to clarify what is and is not a fireable offense

A

AUP or Acceptable Use Policies (AUPs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How to discourage plagarism

A

To help discourage plagiarism of other people’s work,
teachers often require students to submit papers using a service, such as Turnitin, that automatically checks for plagiarized passages; Turnitin can also help students check for uncited passages and more before submitting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Your green computing efforts should include:

A
  • Purchasing and using products with an ENERGY STAR label
  • Shutting down your computers and devices overnight or when not in use.
  • Donating computer equipment
  • Using paperless communication
  • Recycling paper, toner and ink cartridges, computers, mobile devices, and printers
  • Telecommuting and using videoconferencing for meetings
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

risk

A

any possibility that something might occur resulting
in an injury or a loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

digital security risk

A

any event or action that could cause
a loss of or damage to a computer or mobile device
hardware, software, data, information, or processing
capability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Types of digital security risks

A

threats to our information, physical health, mental health, and the environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Any illegal act involving the use of a computer or related devices

A

computer crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

an online or Internet-based illegal act

A

cybercrime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Software used by cybercriminals

A

crimeware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

the practice of protection against digital
threats, including unauthorized or illegal access to data.

A

Cybersecurity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

discovery, collection, and analysis of evidence found on computers and networks.

A

Digital forensics, or cyber forensics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

knowledge of the law, technical experience with many types of hardware and software products, superior communication skills, familiarity with corporate structures and policies, a willingness to learn and update skills, and a knack for problem-solving

A

A digital forensics examiner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

attackers who are strongly motivated by
principles or beliefs

A

Hacktivists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

a part of the web that is accessed using
specialized software, where users and website operators can remain anonymous while performing illegal actions

A

dark web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

more general and common term used to
describe individuals who launch attacks against other
users and their computers

A

Threat actor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

a period of time during which an
individual refrains from using technology

A

digital detox

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

malicious software, consists of
programs that act without a user’s knowledge and
deliberately alter the operations of computers and mobile devices

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A program that displays an online advertisement in a banner, pop-up window, or pop under window on webpages, email messages, or other Internet services

A

Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A program that hides in a computer or mobile device and allows someone from a remote
location to take full control of the computer or device

A

Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
A program placed on a computer or mobile device without the user’s knowledge that secretly collects information about the user and then communicates the information it collects to some outside source while the user is online
Spyware
26
A program that hides within or looks like a legitimate program. Unlike a virus or worm, a trojan horse does not replicate itself to other computers or devices
Trojan horse
27
A potentially damaging program that affects, or infects, a computer or mobile device negatively by altering the way the computer or device works without the user’s knowledge or permission
Virus
28
A program that copies itself repeatedly, for example in memory or on a network, using up resources and possibly shutting down the computer, device, or network
Worm
29
a program that performs a repetitive task on a network
bot
30
a group of compromised computers or mobile devices connected to a network
botnet
31
disrupts computer access to an Internet service (usually on a server- overload the server with network traffic)
A denial of service attack (DoS attack)
32
Spoofing
a technique intruders use to make their network or Internet transmission appear legitimate to a victim’s computer or network.
33
common types of spoofing
IP and address spoofing
34
occurs when an intruder computer tricks a network into believing its IP address is associated with a trusted source.
IP spoofing
35
occurs when the sender’s email address or other components of an email header are altered
Address spoofing
36
a program or set of instructions in a program that allows users to bypass security controls when accessing a program, computer, or network -rookit can also be a back door
Back Doors
37
the process of ensuring that the person requesting access to a computer or other resources is authentic and not an imposter
Authentication
38
A username
—a user ID (identification), log-on name, or sign-in name—is a unique combination of characters, numbers, or alphabets that identifies one specific use
39
password
a secret combination of letters, numbers, and/or characters that only the user should know
40
uses the unique characteristics of your face, hands, or eyes to authenticate you
Biometric security
41
Examples of Biometric
Fingerprint reader Gesture Swipe Passcode Hand geometry system Iris recognition Voice verification Signature Verification
42
Two-Factor Authentication
multiple types of authentication.
43
a program developed at Carnegie Mellon University that displays an image containing a series of distorted characters to identify and enter to verify that user input is from humans
CAPTCHA
44
the process of scrambling information in such a way that it cannot be read unless the user possesses the key to unlock it so that it is returned to a readable format (decryption).
Encryption
45
an electronic, encrypted, and secure stamp of authentication on a document issued by a CA organization.
digital signature
46
Cookies, scripting, plug-ins, pop-ups, and clear browsing data
Browser Security
47
Protecting Your Online Profile
Several general defenses can be used for any social networking site. * First and foremost, you should be cautious about what information you post. * Second, you should be cautious regarding who can view your information. * Finally, you should pay close attention to information about new or updated security settings
48
Privacy Laws
Information collected and stored about individuals should be limited. * Once collected, provisions should be made to protect the data. * Personal information should be released outside the organization collecting the data only when the person has agreed to its disclosure. * The individual should know that the data is being collected and have the opportunity to determine the accuracy of the data.
49
Software theft
occurs when someone: – Steals software media – Intentionally erases programs – Illegally registers and/or activates a program – Illegally copies a program
50
Information theft
occurs when someone steals personal or confidential information
51
Encryption
a process of converting data that is readable by humans into encoded characters to prevent unauthorized access
52
a notice that guarantees a user or a website is legitimate
digital certificate
53
secure site
A website that uses encryption techniques to secure its data
54
Hardware theft
act of stealing digital equipment
55
Hardware vandalism
defacing or destroying digital equipment
56
Hardware Theft and Vandalism Safeguards
– Physical access controls (i.e., locked doors and windows) – Alarm system – Physical security devices (i.e., cables and locks) – Devices-tracking app
57
Hardware Failure Safeguards
– Surge protector – Uninterruptible power supply (UPS) – Duplicate components or duplicate computers – Fault-tolerant computer
58
backup
a duplicate of a file, program, or media that can be used if the original is lost, damaged, or destroyed
59
Categories of backups
– Full – Differential – Incremental – Selective – Continuous data protection – Cloud
60
Technology ethics
the moral guidelines that govern the use of computers, mobile devices, information systems, and related technologies
61
code of conduct
written guideline that helps determine whether a specification is ethical/unethical or allowed/not allowed
62
Sample IT Code of Conduct
1. Technology may not be used to harm other people. 2. Employees may not meddle in others’ files 3. Employees may use technology only for purpose in which they have been authorized. 4. Technology may not be used to steal. 5. Technology may not be used to bear false witness.
63
the movement to ensure that all users, regardless of economic or geographic constraints, have access to the devices, data, and infrastructure required to receive high-speed, accurate, reliable information
Digital inclusion
64
Some barriers to digital inclusion include:
* Geographic areas that lack the infrastructure necessary to provide reliable Internet access * Government restrictions or censorship * Affordable devices or connections * Lack of education * Lack of understanding of the value of technology
65
Information privacy
refers to the right of individuals and companies to deny or restrict the collection, use, and dissemination of information about them
66
How to Safeguard Personal Information
1. Fill in only necessary information on rebate, warranty, and registration forms. 2. Do not preprint your phone number or Social Security number on personal checks. 3. Have an unlisted or unpublished phone number. 4. If you have Caller ID, nd out how to block your number from displaying on the receiver’s system. 5. Do not write your phone number on charge or credit receipts. 6. Ask merchants not to write credit card numbers, phone numbers, Social Security numbers, and driver’s license numbers on the back of your personal checks. 7. Purchase goods with cash, rather than credit or checks. 8. Avoid shopping club and buyer cards 9. View or download a copy of the information associated with your Google, Facebook, Microsoft, or other online accounts you access frequently. Disable search history, location history, and usage information sent to these websites. 10.Inform merchants that you do not want them to distribute your personal information. 11.Request, in writing, to be removed from mailing lists 12.Obtain your credit report once a year from each of the three major credit reporting agencies (Equifax, Experian, and TransUnion) and correct any errors. 13.Request a free copy of your medical records once a year from the Medical Information Bureau. 14. Limit the amount of information you provide to websites. Fill in only required information. 15. Install a cookie manager to filter cookies. 16. Clear your browsing history when you are finished browsing
66
How to Safeguard Personal Information
1. Fill in only necessary information on rebate, warranty, and registration forms. 2. Do not preprint your phone number or Social Security number on personal checks. 3. Have an unlisted or unpublished phone number. 4. If you have Caller ID, nd out how to block your number from displaying on the receiver’s system. 5. Do not write your phone number on charge or credit receipts. 6. Ask merchants not to write credit card numbers, phone numbers, Social Security numbers, and driver’s license numbers on the back of your personal checks. 7. Purchase goods with cash, rather than credit or checks. 8. Avoid shopping club and buyer cards 9. View or download a copy of the information associated with your Google, Facebook, Microsoft, or other online accounts you access frequently. Disable search history, location history, and usage information sent to these websites. 10.Inform merchants that you do not want them to distribute your personal information. 11.Request, in writing, to be removed from mailing lists 12.Obtain your credit report once a year from each of the three major credit reporting agencies (Equifax, Experian, and TransUnion) and correct any errors. 13.Request a free copy of your medical records once a year from the Medical Information Bureau. 14. Limit the amount of information you provide to websites. Fill in only required information. 15. Install a cookie manager to filter cookies. 16. Clear your browsing history when you are finished browsing 17. Set up a free email account. Use this email address for merchant forms. 18. Turn off le and printer sharing on your Internet connection. 19. Install a personal firewall. 20. Sign up for email filtering through your ISP or use an anti-spam program. 21. Do not reply to spam for any reason. 22. Surf the web anonymously using private browsing
67
Information about you can be stored in a database when you:
– Fill out a printed or online form – Create a profile on an online social network – Register a product warranty
68
a small text file that a web server stores on your computer
cookie
69
Websites use cookies for a variety of purposes:
– Allow for personalization – Store user names and/or passwords – Assist with online shopping – Track how often users visit a site – Target advertisements
70
Phishing
a scam in which a perpetrator sends an official looking message that attempts to obtain your personal and/or financial information
71
an object that can be tapped or clicked on a website contains a malicious program
clickjacking
72
defined as gaining unauthorized access to or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naivety of others
Social engineering
73
the process of restricting access to certain material
Content filtering
74
restricts access to specified websites
Web filtering software
75
Employee monitoring
involves the use of computers, mobile devices, or cameras to observe, record, and review an employee’s use of a technology, including communications such as email messages, keyboard activity (used to measure productivity), and websites visited