Emptech 2: internet security Flashcards

1
Q

It refers to the online security or safety of people and their information when using the internet

A

internet security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

It describes security for activities and transactions made over the internet. It’s a particular component of the larger ideas of cybersecurity and computer security, involving topics including browser security, online behavior and network security

A

Internet security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code.

A

computer virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

When this replication succeeds, the affected areas are then said to be _____ with a computer virus.

A

infected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

the name that is given to any type of software that could harm a computer system, interfere with and gather a user’s data, or make the computer perform actions without the owner’s knowledge or permission

A

malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

malware is aka

A

malicious software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

malicious advertising is aka

A

malvertising

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

a piece of malicious code that inserts itself into computer systems, self-replicates, and spreads to other systems and devices.

A

virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Once launched, a computer virus attempts

A

encrypt, distort, steal data and conduct more malware attacts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

data of published of iloveyou virus

A

may 2000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

person who created ily virus

A

onel de guzman

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

As it spreads, a ____ consumes bandwidth, overloading infected systems and making them unreliable or unavailable

A

worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

As it spreads, a worm consumes _____ overloading infected systems and making them unreliable or unavailable

A

bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

it can change and delete files or introduce other malware.

A

worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

worm can be send through (fem)

A

flash drives, email, or message attachments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Once a _____ infiltrates the system, it grants the attacker unauthorized control over devices or spreads malware without the user’s knowledge.

A

trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

This includes stealing sensitive information, modifying files, taking control of the system, or creating backdoors for remote access.

A

trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

trojan are typically distributed through

A

SOCIAL ENGINEERING TECHNIQUES :
email, phishing, fake software update, compromised website

19
Q

adware is a type of

A

grayware

20
Q

ransomware is a time-sensitive cyberattackwhen a hacker _____ user files or devices and holds them for ransom until a certain deadline. Even after the victim proceeds to pay the release payment, they have no guarantee that their files or devices will be _____.

A

encrypts, descrypted

21
Q

ransomware can be initiated through (mecm)

A

malicious files, exploit kits, compromised websites, malware-infected downloads/links

22
Q

spyware is designed to gather

A

sensitive data (passwords, financial details, personal infos, browsing habits)

23
Q

2 answers:
This type of malware is often used as a first stage of a _____ for a hacker to explore the system

A

spyware, data breach

24
Q

spam are aka

A

email spam, junk email

25
Q

Spam can be sent by real humans, but more often, it is sent by a

A

botnet

26
Q

single attacking party

A

bot herder

27
Q

Apart from email, spam can also be distributed

A

text messages, socmed

28
Q

cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords

A

phishing

29
Q

phishing can result in

A

identity theft, financial loss

30
Q

ways to protect ur computer from viruses

A

1-2-3-a-b-a-b

31
Q

THINK

A

is it True
is it Helpful
is it Inspiring
is it Necessary
is it Kind

32
Q

netiquette rules was made by ___ entitled _____

A

Virginia Shea’s Core Rules of Netiquette

33
Q

Golden Rule

A

do unto others as you would have others do unto you

34
Q

When communicating electronically, whether through email, instant message, discussion post, text, or another method, practice the Golden Rule: Do unto others as you would have others do unto you. Remember, your written words are read by real people, all deserving of respectful communication. Before you press “send” or “submit,” ask yourself, “Would I be okay with this if someone else had written it?”

A

remember the human

35
Q

While it can be argued that standards of behavior may be different in the virtual world, they certainly should not be lower. You should do your best to act within the laws and ethical manners of society whenever you inhabit “cyberspace.” Would you behave rudely to someone face-to-face? On most occasions, no. Neither should you behave this way in the virtual world.

A

adhere to the same standards of behavior online that u follow in rl

36
Q

Netiquette varies from domain to domain.” (Shea, 1994) Depending on where you are in the virtual world, the same written communication can be acceptable in one area, where it might be considered inappropriate in another. What you text to a friend may not be appropriate in an email to a classmate or colleague. Can you think of another example?

A

knownwhete u are in cyberspace

37
Q

Electronic communication takes time: time to read and time in which to respond. Most people today lead busy lives, just like you do, and don’t have time to read or respond to frivolous emails or discussion posts. As a virtual world communicator, it is your responsibility to make sure that the time spent reading your words isn’t wasted. Make your written communication meaningful and to the point, without extraneous text or superfluous graphics or attachments that may take forever to download.

A

respect other people’s time and bandwidth

38
Q

One of the virtual world’s best things is the lack of judgment associated with your physical appearance, the sound of your voice, or the clothes you wear (unless you post a video of yourself singing Karaoke in a clown outfit

A

make urself good online

39
Q

tips to look good online

A
  1. always check for spelling and grammar errors
  2. knwo what urm’re talking abt,and state it clearly
  3. be pleasant and polite.
40
Q

one of the reasons why internet was found

A

information sharing

41
Q

rule no.6

A

Share expert knowledge

42
Q

When this replication succeeds, the affected areas are then said to be “____” with a computer virus.

A

infected

43
Q

“flame wars,” when two or three people exchange angry posts between one another, must be controlled, or the ________ of the group could be compromised

A

camaraderie

44
Q
A