Lesson 6: Digital Security, Ethics, and Privacy: Avoiding and Recognizing Threats Flashcards

(43 cards)

1
Q

Protection from hostile forces that intend to compromise the normal state of being of something

A

Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Computer Security and Cybersecurity aims to preserve these three things (CIA):

A

Confidentiality of Data
Integrity of Data
Availability of Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The state of being safe from malicious actors

A

Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Any event or action that could cause a loss of or damage to computer or mobile device hardware, software, data, information, or processing ability

A

Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

______ is meant to be taken, while ________ is the holistic goal of every computer administrator / owner.

A

Risk…security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An intentional breach of digital security often involves a deliberate act that is against the law

A

Cybercrime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A formal and umbrella term for anyone who maliciously acts upon a computer system

A

Threat actors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Individuals who want to attack computers but lack the knowledge and networks needed to do so

A

Script Kiddies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Usually downloads pre-made hacking tools coded by other hackers

A

Script Kiddies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A threat actor that breaks through a computer security without required permission

A

Hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Someone who accesses a computer or network illegally but has the intent of destroying data, stealing information, or other malicious actions

A

Cracker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Attacks a nation’s national computer systems, mostly power grids and tech infrastructure that comprises national security, to instill fear and insecurity

A

Cyberterrorists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Threaten to expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization’s network - if they are not paid a sum of money

A

Cyberextortionist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A common way to trick people to entering their passwords and other info to websites controlled by threat actors

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An Act Defining Cybercrime, Providing for the Prevention, Investigation, Suppression and the Imposition of Penalties Therefor and for Other Purposes

A

RA 10175 - Anti-Cybercrime Act of 2012

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Is the discovery, collection, and analysis of evidence found on computers and networks

A

Digital Forensics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Involves the examination of media, program, data, and log files on computers, mobile devices, servers, and networks

A

Digital Forensics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A contraction of the words “malicious” and “software”

19
Q

A general term for software that is intended to disrupt computer security

20
Q

Also called a zombie army

21
Q

A group of compromised computers or mobile devices connected to a network, often used to attack other networks

22
Q

Usually being used in:
• Automated Troll Farms
• Illegal Crypto Mining
• DDoS Attacks
• and many more that require intensive computing resources

23
Q

A type of attack, usually on a server, that is meant to overload the server with network traffic so that it cannot provide necessary services

A

Denial of Server (DoS)

24
Q

When executed via botnets, DoS is called

A

Distributed DoS (DDoS)

25
A program or set of instructions in a program that allows users to bypass security controls when accessing a program, computer, or network
Backdoor
26
A technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network
Spoofing
27
Make it look like a user uses a website safely, but deep inside the computer, malicious code is running that compromises the user's network and information security
Spoofing
28
Is a category of attacks that attempts to trick the victim into giving valuable information to the attacker
Social Engineering
29
Relies on an attacker's clever manipulation of human nature in order to persuade the victim to provide information or take actions
Social Engineering
30
Detects and automatically takes action against malicious code that attempts to run through a computer
Antivirus
31
Default Antivirus for Windows OS
Windows Defender
32
Protects network resources from outsiders and to restrict employee's access to sensitive data
Firewall
33
Stop malicious intrusions before they attempt to affect your computer or network
Firewall
34
A private, secure path across a public network that allows authorized users secure access to a company or other network
Virtual Private Networks (VPN)
35
Help ensure that data is safe from being intercepted by unauthorized people by encrypting data as it transmits from a laptop, smartphone, or other mobile device
Virtual Private Networks (VPN)
36
Prevent other users from accessing your computer by implementing access controls
Proper Access Controls
37
Remove Guest User Profiles from your computer which could be a way in for an unknown user to upload malicious code in person/manually
Proper Access Controls
38
If your data is backed up, threats of a cyberextortionist/cracker deleting the data won't be a huge deal
Data Backups
39
Perform backups regularly -- a healthy frequency is 1 to 2 months
Data Backups
40
Having a synced cloud storage even reduces the risk of data not being backed up
Data Backups
41
A WiFi access point of the same name as the one existing in public
Avoid Evil Twins
42
A period of time during which an individual refrains from using technology
Digital Detox
43
1. Strong Passwords 2. Two-Factor Authentication 3. Biometrics 4. Captcha 5. Encryptions
Information Privacy