Digital Technology Flashcards
(42 cards)
Keylogging is
the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information.
Phishing is
a technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails.
Malware is
software intended to damage a computing system or to take partial control over its operation.
The process of encoding a plain text message in some secret way is called
Encryption
The process that reverses encryption, taking a secret message and reproducing the original plain text, is called
Decryption
A Caesar Cipher is
a technique for encryption that shifts the alphabet in the original message by some number of characters.
A cipher is
the generic term for a technique (or algorithm) that performs encryption.
A Random Substitution Cipher is
a technique for encryption that replaces the letters of the original message with other, completely random, letters of the alphabet.
Frequency Analysis is
the study of the frequency of letters or groups of letters in a ciphertext in order to break a substitution cipher.
Which of the following is NOT a good strategy when creating a password?
Reuse passwords across multiple accounts.
Single-Factor Authentication (SFA) is a type of security protection that might ask a user to provide which of the following forms of verification?
Password + Password again
Two-Factor Authentication (2FA) is a type of security protection that might ask a user to provide which of the following forms of verification?
Password + Code sent to your phone
Multi-Factor Authentication (MFA) is a type of security protection that might ask a user to provide which of the following forms of verification?
Password + Code sent to your phone + Fingerprint
What can you do to protect your data?
Install updates to system software, install virus scanning software
The additional information that apps and devices exchange along with content, often without the user’s knowledge is known as
Metadata
How can you effectively manage the privacy settings on your mobile apps, computer software, and online accounts?
turn off settings that share information that is unnecessary for the service.
Opt out of companies and services sharing your information with third parties.
Read the privacy policy of each website or app that you use.
A statement that explains in simple language how an organisation or agency handles your personal information is called a
Privacy Policy
All of the information about us that can found on the Internet is known as our
Digital Footprint
A conclusion drawn about you based on the information you share online is called
Inference
Which of the following describes a potential consequence of not managing your digital footprint effectively?
Negative impact on personal reputation and job opportunities.
True or False: Any organisation in Australia that is covered by the Privacy Act 1988 must have a Privacy Policy
True
How might advertisers use information that you intentionally or unintentionally share online?
To personalise advertisements based on your interests and behaviour.
Two or more computers connected together to allow them to communicate is called a
network
What is the name of the first network that only a few people had access to?
ARPANET