Chapter 2 Flashcards

1
Q

It is a collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’s assets.

A

Cybersecurity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Internet threats

A

malware
spam
phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

– stands for malicious software

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

– a malicious program designed to replicate itself and transfer from one computer to another either through the internet and local networks or data storage like flash drives and CDs

A

a. Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

– a malicious program that transfers from one computer to another by any type of means. Often, it uses a computer network to spread itself.

A

b. Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

– a malicious program that is disguised as a useful program but once download or installed, leaves your PC unprotected and allows hackers to get your information.

A

c. Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

– a program that runs in the background without you knowing it. It has the ability to monitor what you are currently doing and typing through keylogging.

A

d. Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

– a program designed to send you advertisements, mostly a pop-ups.

A

e. Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

unwanted email mostly from bots or advertisers. It can be used to send malware.

A
  1. SPAM –
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

– Its goal is to acquire sensitive personal information like passwords and credit card details. This is done by sending you an email that will direct the user to visit a website and asked to update his/her username, password, credit card or personal information.

A
  1. Phishing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

a more complicated way of phishing where it exploits the DNS (Domain Name Service) system.

A

*Pharming –

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  • It refers to the online security or safety of people and their information when using internet.
A

Internet Safety

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  • Is network etiquette, the do’s and don’ts of online communication.
A

Netiquette

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  • treat others as you would like to be treated.
A

The Golden Rule

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

is a personal insult communicated through internet.

A

No Flaming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  • people may misinterpret it.
A

Dont type in all caps

17
Q

it is any unsolicited email from unknown sources.

A

dont spam

18
Q

don’t steal someone else’s idea, property, and rights.

A

obey copyright laws

19
Q

errors diminish the credibility of the message

A

use proper grammar and spelling

20
Q
  • tell the truth
  • do not pretend to be someone else.
A

be honest

21
Q

these are sites with Transport Layer Security (TLS) or Socket Layer Security.

A

shop secure sites