ETECH Flashcards

1
Q

huge issue, with more than 50% of emails being syphoned into these folders

A

Spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Asidefrom being an annoyance, this are not a direct threat, but many can contain malware.

A

Spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When a person surfs the internet, it is a sort of virus that displays unwanted advertisements

A

Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

leave your computer vulnerable to hackers, allowing them to steal any data on your computer.

A

Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

frequently disguise themselves as harmless computer programs in order for hackers to gain access to your computer without being detected by you

A

Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

is one of the most talked about internet threats. Because they are designed to propagate at an alarming rate, they usually attach themselves discreetly to downloads.

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Malicious email attachments or USB sticks are the most common ways for this to get onto a computer.

A

Worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When this infects your computer, it will most likely send itself to every email account on your machine. Your email will appear innocent to the recipient until they read it and find themselves infected by the same.

A

Worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

is a type of fraudulent behavior in its most basic form

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Official- looking emails impersonating a well-known source, such as a bank, are frequently sent. It is the purpose of these emails to acquire people’s passwords and credit card information.

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

is another type of malware

A

spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

it is an all- encompassing internet ailment that is commonly associated with downloading file pop-ups

A

spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

can monitor your keystrokes, read, and destroy your files, reformat your hard drive, and access your apps once it is installed on your computer. Without your knowledge, the individual in charge of the has access to your personal information.

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

which are similar to spyware, record a user’s keyboard operations. The majority of this will hunt for easily identifiable key entries, such as bank card numbers and passwords. Identity and intellectual property theft are frequently tied to

A

keyloggers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

is a more sophisticated form of phishing that takes advantage of the DNS system.

A

Pharming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

frequently construct web pages that look like those of a reputable company, such as an online banking log-in page. Users will then submit their credentials, assuming they are logging in to their regular service, and they will steal their credentials.

A

Pharming

17
Q

This is a form of malicious software and internet fraud that misleads users into believing there is a virus on their computer and aims to convince themto pay for a fake malware removal tool that actually installs malware on their computer.

A

Rogue Security Software

18
Q

it is a code of appropriate online behavior that is similar to politeness in society. Email, social media, online chat, web forums, website comments, multiplayer gaming, and other forms of online communication are all examples of this.

A

Netiquette

19
Q

is defined as the information superhighway. This means that everyone with access to this highway has the ability to place and retrieve information. The larger the risk, the more information you share online. Identity theft, phishing, malware infestations, and other threats are all possible. As a result, Facebook is constantly improving its security features.

A

Internet

20
Q

Any information whether recorded in a material form or not, from which the identity of an individual is apparent or can be reasonably and directly ascertained by the entity holding the information, or when put together with other information would directly and certainly identify an individual.

A

Personal Information

21
Q

SENSITIVE Personal Information examples

A

race, ethnicity, marital status, age, color, religious, political affiliation,

22
Q

3 Data Privacy Principles

A

Transparency, Legitimate Purpose, Proportionality

23
Q

A data subject must be aware of the nature, purpose, and extent of the processing of his or her personal data, including the risks and safeguards involved, the identity of personal information controller, his or her rights as a data subject, and how these can be exercised. Any information and communication relating to the processing of personal data should be easy to access and understand, using clear and plain language

A

Transparency

24
Q

The processing of information shall be compatible with a declared and specified purpose, which must not be contrary to law, morals, or public policy.

A

Legitimate Purpos

25
Q

Refers to any freely given, specific, informed indication of will, whereby the data subject agrees to the collection and processing of personal information about and/or relating to him or her. Consent shall be evidenced by written, electronic or recorded means. It may also be given on behalf of the data subject by an agent specifically authorized by the data subject to do so

A

Consent of the data subject

26
Q

The processing of information shall be adequate, relevant, suitable, necessary, and not excessive in relation to a declared and specified purpose. Personal data shall be processed only if the purpose of the processing could not reasonably be fulfilled by other means.

A

Proportionality

27
Q

Five Pillars of Compliance

A