Emptech 2: internet security Flashcards

1
Q

It refers to the online security or safety of people and their information when using the internet

A

internet security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

It describes security for activities and transactions made over the internet. It’s a particular component of the larger ideas of cybersecurity and computer security, involving topics including browser security, online behavior and network security

A

Internet security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code.

A

computer virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

When this replication succeeds, the affected areas are then said to be _____ with a computer virus.

A

infected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

the name that is given to any type of software that could harm a computer system, interfere with and gather a user’s data, or make the computer perform actions without the owner’s knowledge or permission

A

malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

malware is aka

A

malicious software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

malicious advertising is aka

A

malvertising

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

a piece of malicious code that inserts itself into computer systems, self-replicates, and spreads to other systems and devices.

A

virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Once launched, a computer virus attempts

A

encrypt, distort, steal data and conduct more malware attacts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

data of published of iloveyou virus

A

may 2000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

person who created ily virus

A

onel de guzman

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

As it spreads, a ____ consumes bandwidth, overloading infected systems and making them unreliable or unavailable

A

worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

As it spreads, a worm consumes _____ overloading infected systems and making them unreliable or unavailable

A

bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

it can change and delete files or introduce other malware.

A

worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

worm can be send through (fem)

A

flash drives, email, or message attachments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Once a _____ infiltrates the system, it grants the attacker unauthorized control over devices or spreads malware without the user’s knowledge.

A

trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

This includes stealing sensitive information, modifying files, taking control of the system, or creating backdoors for remote access.

A

trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

trojan are typically distributed through

A

SOCIAL ENGINEERING TECHNIQUES :
email, phishing, fake software update, compromised website

19
Q

adware is a type of

20
Q

ransomware is a time-sensitive cyberattackwhen a hacker _____ user files or devices and holds them for ransom until a certain deadline. Even after the victim proceeds to pay the release payment, they have no guarantee that their files or devices will be _____.

A

encrypts, descrypted

21
Q

ransomware can be initiated through (mecm)

A

malicious files, exploit kits, compromised websites, malware-infected downloads/links

22
Q

spyware is designed to gather

A

sensitive data (passwords, financial details, personal infos, browsing habits)

23
Q

2 answers:
This type of malware is often used as a first stage of a _____ for a hacker to explore the system

A

spyware, data breach

24
Q

spam are aka

A

email spam, junk email

25
Spam can be sent by real humans, but more often, it is sent by a
botnet
26
single attacking party
bot herder
27
Apart from email, spam can also be distributed
text messages, socmed
28
cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords
phishing
29
phishing can result in
identity theft, financial loss
30
ways to protect ur computer from viruses
1-2-3-a-b-a-b
31
THINK
is it True is it Helpful is it Inspiring is it Necessary is it Kind
32
netiquette rules was made by ___ entitled _____
Virginia Shea's Core Rules of Netiquette
33
Golden Rule
do unto others as you would have others do unto you
34
When communicating electronically, whether through email, instant message, discussion post, text, or another method, practice the Golden Rule: Do unto others as you would have others do unto you. Remember, your written words are read by real people, all deserving of respectful communication. Before you press "send" or "submit," ask yourself, "Would I be okay with this if someone else had written it?"
remember the human
35
While it can be argued that standards of behavior may be different in the virtual world, they certainly should not be lower. You should do your best to act within the laws and ethical manners of society whenever you inhabit "cyberspace." Would you behave rudely to someone face-to-face? On most occasions, no. Neither should you behave this way in the virtual world.
adhere to the same standards of behavior online that u follow in rl
36
Netiquette varies from domain to domain." (Shea, 1994) Depending on where you are in the virtual world, the same written communication can be acceptable in one area, where it might be considered inappropriate in another. What you text to a friend may not be appropriate in an email to a classmate or colleague. Can you think of another example?
knownwhete u are in cyberspace
37
Electronic communication takes time: time to read and time in which to respond. Most people today lead busy lives, just like you do, and don't have time to read or respond to frivolous emails or discussion posts. As a virtual world communicator, it is your responsibility to make sure that the time spent reading your words isn't wasted. Make your written communication meaningful and to the point, without extraneous text or superfluous graphics or attachments that may take forever to download.
respect other people's time and bandwidth
38
One of the virtual world's best things is the lack of judgment associated with your physical appearance, the sound of your voice, or the clothes you wear (unless you post a video of yourself singing Karaoke in a clown outfit
make urself good online
39
tips to look good online
1. always check for spelling and grammar errors 2. knwo what urm're talking abt,and state it clearly 3. be pleasant and polite.
40
one of the reasons why internet was found
information sharing
41
rule no.6
Share expert knowledge
42
When this replication succeeds, the affected areas are then said to be "____" with a computer virus.
infected
43
"flame wars," when two or three people exchange angry posts between one another, must be controlled, or the ________ of the group could be compromised
camaraderie
44