unit 10 Flashcards

1
Q

PII

A

Personally Identifiable Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is PII

A

information about an individual that identifies, links, relates, or describes them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what does technology enable?

A

the collection, use, and exploitation about, by and for individuals, groups, and institutions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what can be used to create knowledge about an individual?

A

geolocation, cookies, and browsing history

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what do most digital technology need to work?

A

some sort of PII (street navigation needs location)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is another reason why a website would collect more data?

A

to improve their services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

services and websites collect info that can be used to do what?

A

advertise to you by creating detailed profiles of who you are and what you like

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what can search engines do? what can this be used for?

A

record and maintain a history of searches made by users;
info can be used to suggest websites or for target marketing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

once data is made digital and shared online, what happens to it?

A

it is much harder to control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what can PII used to do in a negative way?

A

steal the identity of a person, or stalk them online

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what happens with information that is often posted social media?

A

can be combined to create a profile on you

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

phishing

A

a technique that attempts to trick a user into providing personal information and then be used to access sensitive online info like bank accounts and emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

keylogging

A

the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

malware

A

software intended to damage a computing system or take partial control over its operation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

rogue access point

A

a wireless access point that gives unauthorized access to secure networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

encryption

A

a process of encoding messages to keep them secret, so only “authorized” parties can read it

17
Q

decryption

A

a process that reverses encryption, taking a secret message and reproducing the original plain text

18
Q

cipher

A

the generic term for a technique (or algorithm) that performs encryption

19
Q

Caesar’s Cipher

A

a technique for encryption that shifts the alphabet by some number of characters

20
Q

cracking encryption

A

when you attempt to decode a secret message without knowing all the specifics of the cipher, you are trying to crack the encryption

21
Q

symmetric key encryption

A

involved one key for both encryption and decryption

22
Q

public key encryption/asymmetric encryption

A

pairs a public key for encryption and a private key for decryption
sender does not need receiver’s private key to encrypt a message, but receiver’s private key is required to decrypt the message

23
Q

what can you do to protect you data?

A

use multifactor authentication
update software

24
Q

single factor authentication

A

something you know (password)

25
two factor authentication
something you know (password) something you possess (phone)
26
multifactor authentication (at least two)
something you know (password) something you possess (phone) something you are (fingerprint)
27
multifactor authentication
a methods of computer access in which a user has to successfully provide evidence in at least two of the following categories : knowledge, possession, and inherence each step provides a new layer of security
28
computer virus scanning software
protects a computing system against infection
29
ransomware
encrypts all your files locking you out and denying access then hacker asks for a ransom to gain back access
30
what is malware a combination of?
malicious and software
31
spear phishing
same as phishing, but targets a specific person with personal information making it more believable
32
techniques spear phishers use
urgency authority mimicry curiosity
33
how are things hijacked?
exploiting vulnerabilities in hardware and software or more often by taking advantage of unintentional decisions made by the people using the software.
34
computer virus
similar to a biology virus that infects, injects, and spreads an executable program that gets installed, usually unintentionally, and harms the user and their computer and spreads to other computers
35
distributed denial of service
using computer viruses, hackers can take over millions of computers and use them as a botnet to attack and take down websites it's a denial of service where the attack comes from many computers
36
botnet
digital army
37
denial of service
when a hacker overwhelms a website with too many requests
38
what is the cause of hacking?
most of the time it's a simple mistake by humans
39
steps to take to avoid getting hacked
strong passwords check for authentic web addresses install system security updates often dont install software you dont trust