Chap 5 Flashcards

1
Q

Netiquette

A

includes the code of acceptable behaviors
users should follow while on the Internet; that is, it is the conduct expected of individuals while online.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

set of legal and moral guidelines that
govern the use of technology, including computers,
mobile devices, information systems, and databases

A

Digital ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cyberbullying

A

a form of bullying that involves digital
devices and platforms such as social media sites, online forums, messaging apps, and email.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

one state that has attempted to define and
enact punishment for cyberbullying. Missouri statute
defines cyberbullying as bullying “through the
transmission of a communication, including but not limited to, a message, text, sound, or image by means of an electronic device.”

A

Missouri

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Distracted driving

A

driving a vehicle while
focusing on other activities, typically involving an
electronic device such as a cell phone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

a document that lists guidelines and repercussions
of using the Internet and other digital company resources, including network storage and email servers

distributed in part to reduce an organization’s
liability and to clarify what is and is not a fireable offense

A

AUP or Acceptable Use Policies (AUPs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How to discourage plagarism

A

To help discourage plagiarism of other people’s work,
teachers often require students to submit papers using a service, such as Turnitin, that automatically checks for plagiarized passages; Turnitin can also help students check for uncited passages and more before submitting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Your green computing efforts should include:

A
  • Purchasing and using products with an ENERGY STAR label
  • Shutting down your computers and devices overnight or when not in use.
  • Donating computer equipment
  • Using paperless communication
  • Recycling paper, toner and ink cartridges, computers, mobile devices, and printers
  • Telecommuting and using videoconferencing for meetings
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

risk

A

any possibility that something might occur resulting
in an injury or a loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

digital security risk

A

any event or action that could cause
a loss of or damage to a computer or mobile device
hardware, software, data, information, or processing
capability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Types of digital security risks

A

threats to our information, physical health, mental health, and the environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Any illegal act involving the use of a computer or related devices

A

computer crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

an online or Internet-based illegal act

A

cybercrime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Software used by cybercriminals

A

crimeware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

the practice of protection against digital
threats, including unauthorized or illegal access to data.

A

Cybersecurity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

discovery, collection, and analysis of evidence found on computers and networks.

A

Digital forensics, or cyber forensics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

knowledge of the law, technical experience with many types of hardware and software products, superior communication skills, familiarity with corporate structures and policies, a willingness to learn and update skills, and a knack for problem-solving

A

A digital forensics examiner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

attackers who are strongly motivated by
principles or beliefs

A

Hacktivists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

a part of the web that is accessed using
specialized software, where users and website operators can remain anonymous while performing illegal actions

A

dark web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

more general and common term used to
describe individuals who launch attacks against other
users and their computers

A

Threat actor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

a period of time during which an
individual refrains from using technology

A

digital detox

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

malicious software, consists of
programs that act without a user’s knowledge and
deliberately alter the operations of computers and mobile devices

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A program that displays an online advertisement in a banner, pop-up window, or pop under window on webpages, email messages, or other Internet services

A

Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A program that hides in a computer or mobile device and allows someone from a remote
location to take full control of the computer or device

A

Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

A program placed on a computer or mobile device without the user’s knowledge that
secretly collects information about the user and then communicates the information it
collects to some outside source while the user is online

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

A program that hides within or looks like a legitimate program. Unlike a virus or worm, a
trojan horse does not replicate itself to other computers or devices

A

Trojan horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

A potentially damaging program that affects, or infects, a computer or mobile device
negatively by altering the way the computer or device works without the user’s knowledge or permission

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

A program that copies itself repeatedly, for example in memory or on a network, using up
resources and possibly shutting down the computer, device, or network

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

a program that performs a repetitive task on a network

A

bot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

a group of compromised computers or mobile devices
connected to a network

A

botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

disrupts computer access to an Internet service (usually on a server- overload the server with network traffic)

A

A denial of service attack (DoS attack)

32
Q

Spoofing

A

a technique intruders use
to make their network or Internet
transmission appear legitimate to a
victim’s computer or network.

33
Q

common types of spoofing

A

IP and address spoofing

34
Q

occurs when an
intruder computer tricks a
network into believing its IP
address is associated with a
trusted source.

A

IP spoofing

35
Q

occurs when the sender’s email address or
other components of an email header are altered

A

Address spoofing

36
Q

a program or set of instructions in a program
that allows users to bypass security controls when
accessing a program, computer, or network
-rookit can also be a back door

A

Back Doors

37
Q

the process of ensuring that the person
requesting access to a computer or other resources is
authentic and not an imposter

A

Authentication

38
Q

A username

A

—a user ID
(identification), log-on
name, or sign-in name—is
a unique combination of
characters, numbers, or
alphabets that identifies
one specific use

39
Q

password

A

a secret combination of letters,
numbers, and/or characters
that only the user should
know

40
Q

uses the
unique characteristics of your
face, hands, or eyes to
authenticate you

A

Biometric security

41
Q

Examples of Biometric

A

Fingerprint reader
Gesture Swipe
Passcode
Hand geometry system
Iris recognition
Voice verification
Signature Verification

42
Q

Two-Factor Authentication

A

multiple types of authentication.

43
Q

a program
developed at Carnegie Mellon
University that displays an
image containing a series of
distorted characters to identify
and enter to verify that user
input is from humans

A

CAPTCHA

44
Q

the process of scrambling information in such a way
that it cannot be read unless the user possesses the key to unlock it so
that it is returned to a readable format (decryption).

A

Encryption

45
Q

an electronic, encrypted, and secure stamp of
authentication on a document issued by a CA organization.

A

digital signature

46
Q

Cookies, scripting, plug-ins, pop-ups, and clear browsing data

A

Browser Security

47
Q

Protecting Your Online Profile

A

Several general defenses can be used for any social networking site.
* First and foremost, you should be cautious about what information you post.
* Second, you should be cautious regarding who can view your information.
* Finally, you should pay close attention to information about new or updated
security settings

48
Q

Privacy Laws

A

Information collected and stored about individuals should be limited.
* Once collected, provisions should be made to protect the data.
* Personal information should be released outside the organization collecting
the data only when the person has agreed to its disclosure.
* The individual should know that the data is being collected and have the
opportunity to determine the accuracy of the data.

49
Q

Software theft

A

occurs when someone:
– Steals software media
– Intentionally erases programs
– Illegally registers and/or activates a program
– Illegally copies a program

50
Q

Information theft

A

occurs when someone steals
personal or confidential information

51
Q

Encryption

A

a process of converting data that is
readable by humans into encoded characters to
prevent unauthorized access

52
Q

a notice that guarantees a user
or a website is legitimate

A

digital certificate

53
Q

secure site

A

A website that uses encryption techniques to secure its
data

54
Q

Hardware theft

A

act of stealing digital equipment

55
Q

Hardware vandalism

A

defacing or destroying digital equipment

56
Q

Hardware Theft and Vandalism Safeguards

A

– Physical access controls (i.e., locked doors and windows)
– Alarm system
– Physical security devices (i.e., cables and locks)
– Devices-tracking app

57
Q

Hardware Failure Safeguards

A

– Surge protector
– Uninterruptible power supply (UPS)
– Duplicate components or duplicate computers
– Fault-tolerant computer

58
Q

backup

A

a duplicate of a file, program, or media
that can be used if the original is lost, damaged, or
destroyed

59
Q

Categories of backups

A

– Full
– Differential
– Incremental
– Selective
– Continuous data protection
– Cloud

60
Q

Technology ethics

A

the moral guidelines that
govern the use of computers, mobile devices,
information systems, and related technologies

61
Q

code of conduct

A

written guideline that helps
determine whether a specification is
ethical/unethical or allowed/not allowed

62
Q

Sample IT Code of Conduct

A
  1. Technology may not be used to harm other people.
  2. Employees may not meddle in others’ files
  3. Employees may use technology only for purpose in
    which they have been authorized.
  4. Technology may not be used to steal.
  5. Technology may not be used to bear false witness.
63
Q

the movement to ensure that all users,
regardless of economic or geographic constraints, have
access to the devices, data, and infrastructure required to receive high-speed, accurate, reliable information

A

Digital inclusion

64
Q

Some barriers to digital inclusion include:

A
  • Geographic areas that lack the infrastructure
    necessary to provide reliable Internet access
  • Government restrictions or censorship
  • Affordable devices or connections
  • Lack of education
  • Lack of understanding of the value of technology
65
Q

Information privacy

A

refers to the right of individuals
and companies to deny or restrict the collection, use,
and dissemination of information about them

66
Q

How to Safeguard Personal Information

A
  1. Fill in only necessary information on rebate,
    warranty, and registration forms.
  2. Do not preprint your phone number or Social
    Security number on personal checks.
  3. Have an unlisted or unpublished phone number.
  4. If you have Caller ID, nd out how to block your
    number from displaying on the receiver’s system.
  5. Do not write your phone number on charge or
    credit receipts.
  6. Ask merchants not to write credit card numbers,
    phone numbers, Social Security numbers, and
    driver’s license numbers on the back of your
    personal checks.
  7. Purchase goods with cash, rather than credit or
    checks.
  8. Avoid shopping club and buyer cards
  9. View or download a copy of the information
    associated with your Google, Facebook, Microsoft,
    or other online accounts you access frequently.
    Disable search history, location history, and usage
    information sent to these websites.
    10.Inform merchants that you do not want them to
    distribute your personal information.
    11.Request, in writing, to be removed from mailing
    lists
    12.Obtain your credit report once a year from each of
    the three major credit reporting agencies (Equifax,
    Experian, and TransUnion) and correct any errors.
    13.Request a free copy of your medical records once
    a year from the Medical Information Bureau.
  10. Limit the amount of information you provide to
    websites. Fill in only required information.
  11. Install a cookie manager to filter cookies.
  12. Clear your browsing history when you are finished
    browsing
66
Q

How to Safeguard Personal Information

A
  1. Fill in only necessary information on rebate,
    warranty, and registration forms.
  2. Do not preprint your phone number or Social
    Security number on personal checks.
  3. Have an unlisted or unpublished phone number.
  4. If you have Caller ID, nd out how to block your
    number from displaying on the receiver’s system.
  5. Do not write your phone number on charge or
    credit receipts.
  6. Ask merchants not to write credit card numbers,
    phone numbers, Social Security numbers, and
    driver’s license numbers on the back of your
    personal checks.
  7. Purchase goods with cash, rather than credit or
    checks.
  8. Avoid shopping club and buyer cards
  9. View or download a copy of the information
    associated with your Google, Facebook, Microsoft,
    or other online accounts you access frequently.
    Disable search history, location history, and usage
    information sent to these websites.
    10.Inform merchants that you do not want them to
    distribute your personal information.
    11.Request, in writing, to be removed from mailing
    lists
    12.Obtain your credit report once a year from each of
    the three major credit reporting agencies (Equifax,
    Experian, and TransUnion) and correct any errors.
    13.Request a free copy of your medical records once
    a year from the Medical Information Bureau.
  10. Limit the amount of information you provide to
    websites. Fill in only required information.
  11. Install a cookie manager to filter cookies.
  12. Clear your browsing history when you are finished
    browsing
  13. Set up a free email account. Use this email
    address for merchant forms.
  14. Turn off le and printer sharing on your Internet
    connection.
  15. Install a personal firewall.
  16. Sign up for email filtering through your ISP or use
    an anti-spam program.
  17. Do not reply to spam for any reason.
  18. Surf the web anonymously using private browsing
67
Q

Information about you can be stored in a database
when you:

A

– Fill out a printed or online form
– Create a profile on an online social network
– Register a product warranty

68
Q

a small text file that a web server stores on
your computer

A

cookie

69
Q

Websites use cookies for a variety of purposes:

A

– Allow for personalization
– Store user names and/or passwords
– Assist with online shopping
– Track how often users visit a site
– Target advertisements

70
Q

Phishing

A

a scam in which a perpetrator sends an
official looking message that attempts to obtain your
personal and/or financial information

71
Q

an object that can be tapped or
clicked on a website contains a malicious program

A

clickjacking

72
Q

defined as gaining unauthorized
access to or obtaining confidential information by
taking advantage of the trusting human nature of some
victims and the naivety of others

A

Social engineering

73
Q

the process of restricting access to certain material

A

Content filtering

74
Q

restricts access to specified websites

A

Web filtering software

75
Q

Employee monitoring

A

involves the use of computers,
mobile devices, or cameras to observe, record, and
review an employee’s use of a technology, including
communications such as email messages, keyboard
activity (used to measure productivity), and websites
visited