unit 8 - cybersecurity Flashcards

1
Q

personally identifiable information (PII)

A

information about an individual that identifies, links, relates, or
describes them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what can be used to create knowledge about an individual

A
  • geolocation, cookies, browsing history
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

most digital technology needs some kind of PII to work

A

ex: street navigation needs to know your location or PII stored online to simplify making online purchases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

once data is made digital, especially once its shared online, its easier or harder to control?

A

much harder to control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

how does our private data power computing innnovations positively

A
  • it makes products that are convenient, interesting, personal, useful, and often “free” because we “pay” with our data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

legal and ethical concerns are raised by:

A
  • computing innovations that harm people
  • computing innovations that play a role in social and political issues
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

privacy policies

A
  • they protect companies legally but are often ignored by users due to complex language
  • they are required even for small businesses to disclose data usage
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

privacy policies: “control”

A
  • data settings????/
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

privacy policies: “not”

A
  • limitations on data usage??
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

privacy policies: “such as”

A
  • signals vague data practices
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what are ways to enhance privacy

A
  • check the last updated date
  • use burner emails
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what are burner emails?

A

An email account set up to temporarily receive messages and attachments when people do not want to divulge their primary email address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

facial recognition technology

A
  • used in apps, surveillance, security
  • nearly half of US adults are in databases
  • works by mapping facial landmarks to create “faceprints”
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what are concerns and uses of facial recognition technology

A
  • gov use it for security (airports)
  • companies track customers emotions and purchasing behaviors
  • raises ethical concerns about privacy, surveillance, and data commercialization
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

supreme court ruling on cell phone data

A
  • limited warrantless access to historical cell phone data
  • challenges the third-party doctrine (previously, shared data wasn’t protected under the Fourth Amendment).
  • case brought by Timothy Carpenter (linked to robberies using cell data without a warrant).
  • tech companies pushed for stronger digital privacy protections.
  • impacts digital privacy rights as surveillance increases.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

phishing

A

a technique that attempts to trick a user into providing personal information. that personal information can then be used to access sensitive online resources, such as bank accounts and emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

keylogging

A

the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

malware

A

software intended to damage a computing system or to take partial control over its operation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

rogue access point

A

a wireless access point that gives unauthorized access to secure networks

20
Q

encryption

A

a process of encoding messages to keep them secret, so only “authorized” parties can read it

21
Q

decryption

A

a process that reverses encryption, taking a secret message and reproducing the original plain text

22
Q

cipher

A

the generic term for a technique (or algorithm) that performs encryption

23
Q

caesar’s cipher

A

a technique for encryption that shifts the alphabet by some number of characters

24
Q

cracking encryption

A

when you attempt to decode a secret message without knowing all the specifics of the cipher, you are trying to crack the encryption

25
symmetric key encryption
involves one key for both encryption and decryption
26
public key encryption
pairs a public key for encryption and a private key for decryption - the sender does not need the receiver's private key to encrypt a message, but the receiver's private key is required to decrypt the message
27
what can you do to protect your data
use multifactor authentication
28
how can attackers get info for two factor authentication
- fake logic pages - compromised devices - intercepting authentication messages
29
ways in which hacking occurs
- sim swapping - phishing and MITM attacks - malware and keyloggers - session hijacking
30
ways to improve security
- use hardware security keys instead of SMS - enable biometric authentication when possible - use app based authenticators - be cautious with push notifications and monitor login attempts - strong unique passwords
31
how can you protect your device from computer viruses
virus scanning software & updating system software
32
multifactor authentication
a method of computer aceess in which a user has to successfully provide evidence in at least two of the following categories: knowledge, possesion, and inheritance. each layer provides a new layer of security
33
computer virus scanning software
protects a computing system against infection
34
how can u tell the URL is sus
- doesn't have a top level domain (.net, .org. .com" - honest if the company name is in the middle kinda (accounts.paypal.com)
35
access points
- connect to the internet via a wired connection but share it wirelessly with many devices like your computer - most routers include access points
36
routers
- contain access points - not responsible for providing wireless internet access
37
malware
- "malicious software" that is unknowingly installed onto a computer; often tries to steal data or make money off of the user
38
malware: trojan horse
harmful program that poses as a legit program
39
malware: virus
- self replicating: contains code that copies itself into other files on the system
40
malware: worm
- self replicating but it copies itself into entirely different computers within the network
41
firewall
a system that monitors incoming and outgoing network traffic to a computer or internal network and determines what traffic to allow; these cannot identify and block all malware, but they are a useful line of defense for what they can identify
42
antivirus software
- protects an individual computer by constantly scanning files and identifying malware - once it finds malware, guides the users to deleting or repairing
43
what allows people to share private information over open networks
encryption!
44
websites often use cookies...
to track user actions on their site and even acrosss other sites
45