IT Security and Ethics Flashcards

(66 cards)

1
Q

is any event or action that could cause a loss of or damage to a computer or mobile device hardware, software, data, information, or processing capability.

A

digital security risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Any illegal act involving the use of a computer or related devices

A

DSR: COMPUTER CRIME

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

is an online or Internet-based illegal act.

A

DSR: CYBERCRIME

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

TYPES OF DIGITAL SECURITY RISK:

A
  1. Internet and network attacks
  2. Unauthorized access and use
  3. Hardware theft
  4. Software theft
  5. Information theft
  6. System failure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

is essentially an unwanted intrusion into a computer network or system connected to the internet.

Attackers can have different motives, such as stealing data (financial information, personal details), disrupting operations (taking down websites, causing outages), or installing malware for further attacks.

A

internet or network attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

INTERNET AND NETWORK ATTACK

Types of Attacks:

A
  1. Active Attacks: The attacker actively tries to modify or harm data. This could involve installing malware, deleting files, or launching denial-of-service attacks (DoS/DDoS) to overload systems.
  2. Passive Attacks: The attacker gathers information without being noticed. This might involve eavesdropping on network traffic to steal data or spying on user activity.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

INTERNET AND NETWORK ATTACK
EXAMPLE OF ACTIVE ATTACKS:

A
  1. Denial-of-Service (DoS) attack
  2. Malware infections
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

This attack aims to overwhelm a website or online service with a massive amount of traffic, making it unavailable to legitimate users. It’s like creating a huge crowd at a store entrance to prevent anyone from entering.

A

Denial-of-Service (DoS) attack

Attacker -> Bombs the victim with HTTP requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Malware is shorten for malicious software. It is a program that actively modifies your system, steals data, or disrupts operations. Viruses, ransomware, and Trojan horses all fall under this category.

A

Malware infections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Some examples of internet and network attack

A
  1. Virus = Spreads between computers
  2. Worm = Spreads between computers in one company or location
  3. Trojan = Sneaks malware into your computer
  4. Spyware = Steals your data
  5. Adware = Spams you with ads
  6. Ransomware = Encrypts files and blackmails you
  7. Fileless malware = Operates in your system’s memory
  8. Rootkit = Gives remote access to your device
  9. Botnet = Turns your PC into a puppet
  10. Keylogger = Records user activity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

is a type of malicious software, or malware, specifically designed to spread itself from one computer to another. They replicate by attaching themselves to other programs or files, and then those infected programs or files spread the ——- when they are opened or executed.

A

computer virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

is a piece of malware similar to a virus, but with a key difference: how it spreads. Unlike viruses that need to piggyback on other programs, —— can replicate themselves independently.

A

computer worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

HOW TO KNOW IF YOUR SYSTEM IS INFECTED BY A MALWARE?

A

System Performance:
- Slowness
- Frequent crashes
Unusual Activity:
- Pop-ups and spam
- Unknown programs
- Excessive disk activity
Internet Behavior:
- Homepage changes
- Connection issues
Security Issues:
- Disabled antivirus
- Security software warnings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How to prevent malware in your device?

A
  1. Install and Maintain Antivirus Software
  2. Be wary of Email Attachment and Links
  3. Be Smart about downloading software
  4. Keep your software up to date
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

refers to someone gaining entry to a computer system, network, or data storage without permission and using it for unintended purposes. This is a major security concern because it can lead to a variety of harmful consequences.

A

Unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

is the improper or unintended utilization of a computer system, network, or data storage after someone gains unauthorized access.

A

Unauthorized use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How to protect yourself from unauthorized access and use?

A

password
pin
possessed object
biometric device
two-step verification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A passphrase is a private combination of words, often containing mixed capitalization and punctuation, associated with a user name that allows access to certain computer resources.

A

Password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Minimum Length: Most websites and applications will enforce a minimum password length, typically between _______ characters. Longer passwords are always better for security.

A

8 and 12

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Character Types: Many services require passwords to include a combination of different character types for increased complexity. This often includes:

A

Uppercase letters (A-Z)
Lowercase letters (a-z)
Numbers (0-9)
Symbols (!@#$%^&*)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

sometimes called a passcode, is a numeric password, either assigned by a company or selected by a user.

A

PIN (personal identification number)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

is any item that you must possess, or carry with you, in order to gain access to a computer or computer facility.

A

possessed object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

authenticates a person’s identity by translating a personal characteristic into a digital code that is compared with a digital code in a computer or mobile device verifying a physical or behavioral characteristic.

A

biometric device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

uses two separate methods, one after the next, to verify the identity of a user.

A

Two-step verification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
is the branch of forensic science that focuses on recovering and investigating data from digital devices. This data can include anything from emails and documents to photos and videos. ------------- is used in a variety of contexts, including law enforcement investigations, civil litigation, and incident response.
Digital forensics
26
also commonly known as software piracy, is the illegal copying, distribution, sharing, selling or use of software programs.
Software theft
27
is a process that verifies a software license is valid. This helps prevent software piracy, where people use copied or illegal versions of software. When you activate software, you typically provide a license key that is linked to your purchase.
Product activation
28
How software is protected?
Product activation software license agreement (SLA)
29
is a legal contract between you (the licensee) and the software developer (the licensor) that spells out the terms of how you can use their software. It's essentially a permission slip that grants you certain rights to use the software, but you don't actually own the software itself.
software license agreement (SLA)
30
Platform use for software theft
The Pirate Bay IGET INTO PC
31
also known as data theft, is the illegal retrieval, copying, or storage of someone's personal information.
Information theft
32
How to protect from Information theft
Encryption Digital signature Digital certificate Secure site
33
is a process of converting data that is readable by humans into encoded characters to prevent unauthorized access
Encryption
34
Another term for encrypted text
Ciphertext
35
is an encrypted code that a person, website, or organization attaches to an electronic message to verify the identity of the message sender
digital signature
36
is a notice that guarantees a user or a website is legitimate
digital certificate
37
A website that uses encryption techniques to secure its data is known as a
secure site
38
is an act of stealing digital equipment
Hardware theft
39
is the act of defacing or destroying digital equipment
Hardware vandalism
40
How to protect from Hardware theft, vandalism, and failure
1. Physical Security Measures: - Physical barriers: Lock down your devices Secure rooms and server cabinets - Alarms and security systems - Limited access - Maintain awareness 2. Data Security Measures: - Backups Onsite Backup Cloud
41
is the branch of philosophy that explores what is morally right and wrong. It's about studying the principles that govern human behavior and making reasoned judgments about complex situations.
Ethics
42
It refers to the guiding precepts and norms that are adopted and applied to regulate and control the use of computers and its applications.
COMPUTER ETHICS
43
It is the moral guidelines that govern the use of computers, mobile devices, information systems, and related technologies
TECHNOLOGY ETHICS
44
“the right to be left alone when you want to be"
Privacy
45
“right to be forgotten”
Information Privacy
46
Email Breach Checker haveibeenpwnd.com
47
refers to the right of individuals and companies to deny or restrict the collection, use, and dissemination of information about them.
Information Privacy
48
is a small text file that a web server stores on your computer
Cookie
49
is a scam in which a perpetrator sends an official looking email message that attempts to obtain your personal and/or financial information.
Phishing
50
is defined as gaining unauthorized access to or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naivety of others.
Social engineering
51
“to protect the fundamental human right of privacy, of communication while ensuring free flow of information to promote innovation and growth.”
Data Privacy Act 2012 (Republic Act 10173)
52
LEGAL PROTECTION:
1. Data Privacy Act 2012 (Republic Act 10173) 2. Electronic Commerce Act of 2000 (Republic Act 8792) 3. Cybercrime Prevention Act of 2012 (Republic Act 10175) 4. Anti Wire-Tapping Law (Republic Act 4200)
53
An act providing for the recognition and use of electronic commercial and non-commercial transactions and documents, penalties for unlawful use thereof and for other purposes.
Electronic Commerce Act of 2000 (Republic Act 8792)
54
It aims to address legal issues concerning online interactions and the Internet in the Philippines. Among the cybercrime offenses included in the bill are cybersquatting, cybersex, child pornography, identity theft, illegal access to data and libel.
Cybercrime Prevention Act of 2012 (Republic Act 10175)
55
An act to prohibit and penalize wire tapping and other related violations of the privacy of communication, and for other purposes.
Anti Wire-Tapping Law (Republic Act 4200)
56
OTHER PROTECTION:
Copyright Patent Trademarks
57
protects any tangible form of expression (but not ideas) from being copied by others for a period of time.
Copyright
58
In the Philippines, copyright protection for artistic, literary and derivative works lasts during the lifetime of the author plus 50 years after the author's death.
59
Copyright This includes things like: - Literary works (books, articles) - Musical compositions - Artistic creations (paintings, sculptures) - Films - Computer programs
60
Copyright Issues Taylor Swift copyright Issue Shaira copyright Issue
61
in its most general sense, is the act of copying of copyrighted materials done for purposes such as commenting, criticizing, or parodying a copyrighted work without the permission from the copyright owner. It is used as a defense under copyright infringement.
fair use
62
Protects inventions and new processes. This could be a new machine, a chemical compound, or even a new way of doing business.
Patent
63
Patent Case: The case highlighted the growing importance of patent battles in the mobile phone industry
Blackberry v. HTC (2011): Research In Motion, the maker of Blackberry phones, sued HTC for infringing on patents related to smartphone features like email and messaging functionalities.
64
Patent case: The case explored the boundaries of design patent protection and resulted in significant damages awarded to Apple.
Apple v. Samsung (multiple cases, 2011-2018): This series of lawsuits involved Apple accusing Samsung of copying the design and functionalities of various Apple products like the iPhone and iPad.
65
Distinctive words, phrases, symbols, or designs that identify and distinguish the source of goods or services from others. This includes: Brand names (e.g., Apple, Nike) Logos (e.g., the swoosh logo) Slogans (e.g., "Just Do It")
Trademark
66
Trademark issue
7 Evelyn Louis Vuiton Dak