Digital Security Risks Flashcards

1
Q

It refers to potential threats and vulnerabilities that could compromise the confidentiality, integrity, or availability of data, systems, or networks.
These risks can stem from various sources, such as malicious attacks, human errors, or software vulnerabilities.

A

Digital Security Risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Types of Digital Security Risks

A
  1. Malware
  2. Viruses
  3. Worms
  4. Trojan Horses
  5. Ransomware
  6. Spyware
  7. Adware
  8. Phishing
  9. Social Engineering
  10. Data Breaches
  11. Denial of Service (DoS) and Distributed Denial of Service (DDoS) Attacks
  12. Man-in-the-Middle (MitM) Attacks
  13. Zero-Day Exploits
  14. Brute Force Attacks
  15. Insider Threats
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Malicious software designed to harm or exploit systems.

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Attaches itself to legitimate software and spreads to other files.

A

Viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Self-replicating malware that spreads without needing a host file.

A

Worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Disguised as legitimate software but performs malicious activities.

A

Trojan Horses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Encrypts a user’s files and demands payment for their release.

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Collects sensitive information without the user’s knowledge.

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Automatically delivers unwanted ads.

A

Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Fraudulent attempts to obtain sensitive information (such as usernames, passwords, and credit card details) by disguising as a trustworthy entity in electronic communications (e.g., email, SMS).

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Manipulating individuals into divulging confidential or personal information, often through deceptive tactics like posing as a trusted person or authority.

A

Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Unauthorized access to confidential data, which may lead to loss of sensitive information such as personal data, intellectual property, or financial information.

A

Data Breaches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Overloading a network or server with excessive requests to make it unavailable to legitimate users.

A

Denial of Service (DoS) and Distributed Denial of Service (DDoS) Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A hacker intercepts and potentially alters the communication between two parties without their knowledge.

A

Man-in-the-Middle (MitM) Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Exploiting software vulnerabilities that the software vendor is unaware of or has not yet patched.

A

Zero-Day Exploits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Attempts to crack passwords or encryption keys by trying all possible combinations.

A

Brute Force Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Employees or contractors who intentionally or unintentionally compromise the security of an organization from within.

A

Insider Threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

These are actions carried out by malicious actors intending to disrupt, damage, or gain unauthorized access to computer systems or networks.

A

Internet and Network Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Common Types of Network Attacks

A
  1. Packet Sniffing
  2. Spoofing
  3. IP Spoofing
  4. DNS Spoofing
  5. SQL Injection
  6. Cross-Site Scripting (XSS)
  7. Password Attacks
  8. Dictionary Attacks
  9. Rainbow Table Attacks
  10. Botnets
  11. Session Hijacking
  12. DNS Attacks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Intercepting and capturing packets of data as they travel through the network. Tools like Wireshark are used to analyze network traffic.

A

Packet Sniffing

21
Q

Pretending to be another entity by falsifying data to gain access to systems or resources.

22
Q

Modifying the IP address in packets to hide the identity of the attacker.

A

IP Spoofing

23
Q

Redirecting traffic to a malicious website by corrupting DNS data.

A

DNS Spoofing

24
Q

Inserting malicious SQL queries into web forms to manipulate or retrieve data from a database.

A

SQL Injection

25
Q

Injecting malicious scripts into a website, which then executes on a user’s browser, potentially stealing data or performing actions on behalf of the user.

A

Cross-Site Scripting (XSS)

26
Q

Attempting to gain unauthorized access by cracking passwords.

A

Password Attacks

27
Q

Using a list of known passwords to attempt access.

A

Dictionary Attacks

28
Q

Precomputed hash tables used to reverse cryptographic hash functions.

A

Rainbow Table Attacks

29
Q

Networks of infected computers (bots) under the control of an attacker. These are used to launch coordinated attacks, such as DDoS attacks, or send spam.

30
Q

Taking control of a user’s active session by stealing session cookies or tokens.

A

Session Hijacking

31
Q

Manipulating the Domain Name System to redirect users to malicious websites or disrupt the functioning of a network.

A

DNS Attacks

32
Q

Digital Ethics Issues

A
  1. Privacy
  2. Intellectual Property
  3. Censorship
  4. Digital Divide
  5. Cyberbullying
  6. Social Manipulation
  7. Automation and AI Ethics
  8. Digital Ownership and Control
33
Q

Balancing the need for data collection (e.g., for security or marketing) with the individual’s right to privacy. Issues arise from government surveillance, corporate data mining, and social media platforms collecting user data.

34
Q

Digital content (software, music, movies) is easily copied and distributed, raising concerns about copyright infringement, fair use, and plagiarism.

A

Intellectual Property

35
Q

Governments or organizations may restrict access to certain content (e.g., political, religious, or controversial materials).
This can be seen as a violation of freedom of expression.

A

Censorship

36
Q

The gap between those who have access to modern technology and the internet and those who do not.
This inequality impacts education, job opportunities, and economic development.

A

Digital Divide

37
Q

The use of digital platforms to harass, threaten, or humiliate others. Social media has amplified the reach and intensity of this incidents.

A

Cyberbullying

38
Q

The use of digital platforms to spread misinformation, fake news, or propaganda to influence public opinion, elections, or social movements.

A

Social Manipulation

39
Q

The increasing use of artificial intelligence raises questions about job displacement, bias in decision-making algorithms, and the responsibility for decisions made by machines.

A

Automation and AI Ethics

40
Q

Who owns and controls the data that users create? Should users have full control over their digital footprint, or do companies and platforms have rights over the data they collect?

A

Digital Ownership and Control

41
Q

Legal and Regulatory Frameworks

A
  1. GDPR
  2. COPPA
  3. HIPAA
42
Q

A European Union law that governs data protection and privacy, setting strict guidelines on how personal data is collected, stored, and processed.

A

GDPR (General Data Protection Regulation)

43
Q

U.S. regulation that protects the privacy of children under 13 by restricting data collection on websites targeting children.

A

COPPA (Children’s Online Privacy Protection Act)

44
Q

Protects the privacy and security of health information.

A

HIPAA (Health Insurance Portability and Accountability Act)

45
Q

Impact on Society

A
  1. Evolving Social Norms
  2. Job Market and Automation
  3. Security and Freedom
  4. Global Connectivity
46
Q

Technology has transformed how people communicate, work, and socialize. Social norms around privacy, sharing, and interaction have shifted, particularly with the rise of social media.

A

Evolving Social Norms

47
Q

Automation and artificial intelligence are reshaping industries. While technology has created new jobs, it has also led to job displacement in some sectors (e.g., manufacturing, retail).

A

Job Market and Automation

48
Q

The balance between ensuring national security and preserving individual freedoms is a constant debate, especially in areas like government surveillance, encryption, and internet censorship.

A

Security and Freedom

49
Q

The internet has made it possible for people worldwide to connect, collaborate, and share information. However, it has also exposed vulnerabilities to cyberattacks and increased the spread of disinformation.

A

Global Connectivity