Dark Side Of Computing Flashcards

1
Q

What can bad programming lead to?

A

Bugs, security vulnerabilities, and incorrect data

Bad programming can be full of logic errors and may lack data validation techniques.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the consequences of poor training for users?

A

Users make mistakes and lose trust in the system

Poor training can lead to user errors that undermine system reliability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What can result from a breakdown in user trust?

A

Decreased efficiency, reduced morale, increased workload, incorrect/delayed decision making

Frequent system failures can lead to users putting off work, creating workarounds, and making poor decisions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How can information inaccuracy affect product quality?

A

Decreased product quality

This includes physical products and intangible information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are some methods for data protection?

A

Control access to physical data, limit use of portable storage, control access to computers

This includes locking rooms, password protection, and monitoring internet usage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is social engineering?

A

Manipulating people to gain access to their secrets or data

It often relies on tricking individuals into revealing sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a common phishing attack sequence?

A

Receive email, click link, enter credentials on fake site

The fake site mimics a legitimate organization to steal user information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the signs of phishing emails?

A

Too good to be true offers, requests for personal information, urgency

Examples include fake lottery winnings or job offers requiring payment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is malware?

A

Malicious software designed to infect a computer and disrupt normal operations

It can steal data, install more malware, and monitor user activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How can computers be infected with malware?

A

Opening infected files, installing infected software, visiting infected websites

Other methods include drive-by downloads and exploiting software vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Trojan horse in cybersecurity?

A

Malware disguised as a normal file or program

It tricks users into opening it, allowing attackers access to the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does spyware do?

A

Tracks computer and online activities without the user’s knowledge

It sends this data back to the creator of the spyware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the purpose of ransomware?

A

To encrypt files on a computer and demand a ransom for decryption

Paying the ransom does not guarantee file recovery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What distinguishes a worm from a virus?

A

Worms self-replicate and spread independently

Unlike viruses, worms do not require user action to propagate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a rootkit?

A

Malware that hides its presence and allows remote access to a computer

It is difficult to detect and often requires a complete system wipe to remove.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is browser hijacking?

A

Changing a web browser’s settings without permission

It may redirect users to unwanted sites or display ads.

17
Q

What is a Denial of Service (DoS) attack?

A

A cyber-attack that makes a network resource unavailable

It floods a target with requests to overload the system.

18
Q

What is the definition of computer misuse?

A

Using computer resources without permission for unauthorized tasks

This includes hacking, piracy, and using work computers for personal tasks.

19
Q

What are some social consequences of malware?

A

Financial costs, lost productivity, personal implications

This includes fraud, time wasted fixing infections, and decreased trust.

20
Q

Fill in the blank: Malware that displays ads on your computer is called _______.

A

Adware

Adware often comes bundled with spyware.

21
Q

True or False: All phishing emails are easy to identify.

A

False

Many phishing attempts are designed to look legitimate and can be very convincing.