unit 10 Flashcards

1
Q

PII

A

Personally Identifiable Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is PII

A

information about an individual that identifies, links, relates, or describes them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what does technology enable?

A

the collection, use, and exploitation about, by and for individuals, groups, and institutions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what can be used to create knowledge about an individual?

A

geolocation, cookies, and browsing history

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what do most digital technology need to work?

A

some sort of PII (street navigation needs location)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is another reason why a website would collect more data?

A

to improve their services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

services and websites collect info that can be used to do what?

A

advertise to you by creating detailed profiles of who you are and what you like

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what can search engines do? what can this be used for?

A

record and maintain a history of searches made by users;
info can be used to suggest websites or for target marketing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

once data is made digital and shared online, what happens to it?

A

it is much harder to control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what can PII used to do in a negative way?

A

steal the identity of a person, or stalk them online

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what happens with information that is often posted social media?

A

can be combined to create a profile on you

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

phishing

A

a technique that attempts to trick a user into providing personal information and then be used to access sensitive online info like bank accounts and emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

keylogging

A

the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

malware

A

software intended to damage a computing system or take partial control over its operation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

rogue access point

A

a wireless access point that gives unauthorized access to secure networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

encryption

A

a process of encoding messages to keep them secret, so only “authorized” parties can read it

17
Q

decryption

A

a process that reverses encryption, taking a secret message and reproducing the original plain text

18
Q

cipher

A

the generic term for a technique (or algorithm) that performs encryption

19
Q

Caesar’s Cipher

A

a technique for encryption that shifts the alphabet by some number of characters

20
Q

cracking encryption

A

when you attempt to decode a secret message without knowing all the specifics of the cipher, you are trying to crack the encryption

21
Q

symmetric key encryption

A

involved one key for both encryption and decryption

22
Q

public key encryption/asymmetric encryption

A

pairs a public key for encryption and a private key for decryption
sender does not need receiver’s private key to encrypt a message, but receiver’s private key is required to decrypt the message

23
Q

what can you do to protect you data?

A

use multifactor authentication
update software

24
Q

single factor authentication

A

something you know (password)

25
Q

two factor authentication

A

something you know (password)
something you possess (phone)

26
Q

multifactor authentication (at least two)

A

something you know (password)
something you possess (phone)
something you are (fingerprint)

27
Q

multifactor authentication

A

a methods of computer access in which a user has to successfully provide evidence in at least two of the following categories : knowledge, possession, and inherence
each step provides a new layer of security

28
Q

computer virus scanning software

A

protects a computing system against infection

29
Q

ransomware

A

encrypts all your files locking you out and denying access
then hacker asks for a ransom to gain back access

30
Q

what is malware a combination of?

A

malicious and software

31
Q

spear phishing

A

same as phishing, but targets a specific person with personal information making it more believable

32
Q

techniques spear phishers use

A

urgency
authority
mimicry
curiosity

33
Q

how are things hijacked?

A

exploiting vulnerabilities in hardware and software or more often by taking advantage of unintentional decisions made by the people using the software.

34
Q

computer virus

A

similar to a biology virus that infects, injects, and spreads
an executable program that gets installed, usually unintentionally, and harms the user and their computer and spreads to other computers

35
Q

distributed denial of service

A

using computer viruses, hackers can take over millions of computers and use them as a botnet to attack and take down websites

it’s a denial of service where the attack comes from many computers

36
Q

botnet

A

digital army

37
Q

denial of service

A

when a hacker overwhelms a website with too many requests

38
Q

what is the cause of hacking?

A

most of the time it’s a simple mistake by humans

39
Q

steps to take to avoid getting hacked

A

strong passwords
check for authentic web addresses
install system security updates often
dont install software you dont trust