Internet Security Flashcards

(44 cards)

1
Q

refers to the online security or safety of
people and their information when using the internet.

A

Internet Safety

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Is network etiquette, the dos and
don’ts of online communication

A

Netiquette

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

is roughly equivalent to privacy.
Confidentiality measures are designed to prevent sensitive information from
unauthorized access attempts.

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

involves maintaining the consistency,
accuracy, and trustworthiness of data over its entire lifecycle. Data must not be changed in transit, and steps must be taken to ensure data cannot be altered by unauthorized people

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

means information should be
consistently and readily accessible for
authorized parties. This involves properly
maintaining hardware and technical
infrastructure and systems that hold and
display the information.

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A circumstance or event whereby an entity
gains access to data for which the entity is not authorized.

A

Unauthorized Disclosure (threat consequence)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A circumstance or event that interrupts or
prevents the correct operation of system services and functions.

A

Disruption (threat consequence)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A circumstance or event that may result in an authorized entity receiving false data and believing it to be true.

A

Deception (threat consequence)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A circumstance or event that results in control of system services or functions by an unauthorized entity.

A

Usurpation (threat consequence)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Sensitive data are directly released to an unauthorized entity.

A

Exposure (threat action (attack))

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An unauthorized entity directly accesses sensitive data traveling between authorized sources and destinations.

A

Interception (threat action attack)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A threat action whereby an unauthorized entity indirectly accesses sensitive data by reasoning from characteristics or byproducts of communications.

A

Inference (threat action attack)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An unauthorized entity gains access to sensitive data by circumventing a system’s security protections.

A

Intrusion (threat action attack)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

prevents or interrupts system operation by disabling a system component.

A

Incapacitation (threat action attack)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

undesirably alters system operation by adversely modifying system functions or data.

A

Corruption (threat action attack)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

a threat action that interrupts the delivery of system services by hindering system operation.

A

Obstruction (threat action attack)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

an unauthorized entity gains access to a system or performs a malicious act by posing as an authorized entity.

A

Masquerade (threat action attack)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

of false data deceives an authorized entity.

A

Falsification (threat action attack)

19
Q

an entity deceives another by falsely denying responsibility for an act.

A

Repudiation (threat action attack)

20
Q

is a person or entity
that pretends to be someone or something else to deceive or gain unauthorized access to computer systems, networks, or information.

21
Q

Pretending to be an authorized user, administrator, or system to gain access to sensitive information or perform unauthorized actions.

A

Impersonation

22
Q

Manipulating network traffic or information to appear as if it’s coming from a trusted source or identity.

23
Q

Sending deceptive emails or messages that appear to be from legitimate sources to trick recipients into revealing sensitive information like passwords.

24
Q

is an individual who gains
unauthorized access to computer systems or networks to find vulnerabilities, exploit them, or manipulate the systems for various purposes.

25
Individuals who have supervision or administrative control over the system and misuse the authoritative power given to them. The misconduct of power is often done by superlative authorities for financial gains, such a category of intruders is referred to as
Clandestine User
26
A crime committed or assisted through the use of the Internet.
Cybercrime
27
This tells the user how the website will handle its data.
Privacy Policy/Terms of Services (ToS)
28
a file or code, typically delivered over a network, that infects, explores, steals or conducts virtually any behavior an attacker wants. It is a short term for “malicious software”
Malware
29
a malicious program designed to transfer from one computer to another in any means possible.
Virus
30
a malicious program designed to replicate itself and transfer from one file folder to another and also transfer to other computers.
Worms
31
a malicious program designed that is disguised as a useful program but once downloaded or installed, leaves your PC unprotected and allows hackers to get your information.
Trojan
32
a program that runs in the background without you knowing it. It has the ability to monitor what you are currently doing and typing through key logging.
Spyware
33
a program designed to send you advertisement, mostly pop-ups.
Adware
34
unwanted email mostly from bots or advertisers.
Spam
35
This form of masquerading acquires sensitive personal information like passwords and credit card details.
Phishing
36
a type of intellectual property that protects original works of authorship as soon as an author fixes the work in a tangible form of expression.
Copyright
37
These are tools that record what a person types on a device. While there are legitimate and legal uses for this, many use this for malicious purposes.
Keyloggers
38
This means that an intellectual property may be used w/o consent as long as it is used in commentaries, criticism, parodies, research, etc.
Fair Use
39
is a form of malicious software and internet fraud that misleads users into believing that there is a virus on their computer, and manipulates them into paying money for a fake malware removal tool.
Rogue Security Software
40
is a word or phrase preceded by the "#" symbol (also known as the pound sign or hash symbol) used on social media and other online platforms
hashtag
41
to categorize content and make it easily discoverable by users interested in specific topics or themes.
hashtag
42
serve as a way to organize and label content, allowing users to quickly find and engage with posts, photos, videos, and discussions related to a particular subject.
hashtag
43
is a portmanteau of the words " " and " " and it refers to a user-generated classification system or tagging system used to categorize and organize digital content, typically on the internet.
Folk and taxonomy
44
allows user to categorize and classify information using freely chosen keywords e.g. tagging by FB, Twitter, using tags that start with the sign #, referred to as hashtag.
Folksonomy