ETECH Flashcards
huge issue, with more than 50% of emails being syphoned into these folders
Spam
Asidefrom being an annoyance, this are not a direct threat, but many can contain malware.
Spam
When a person surfs the internet, it is a sort of virus that displays unwanted advertisements
Adware
leave your computer vulnerable to hackers, allowing them to steal any data on your computer.
Trojan
frequently disguise themselves as harmless computer programs in order for hackers to gain access to your computer without being detected by you
Trojan
is one of the most talked about internet threats. Because they are designed to propagate at an alarming rate, they usually attach themselves discreetly to downloads.
Virus
Malicious email attachments or USB sticks are the most common ways for this to get onto a computer.
Worms
When this infects your computer, it will most likely send itself to every email account on your machine. Your email will appear innocent to the recipient until they read it and find themselves infected by the same.
Worms
is a type of fraudulent behavior in its most basic form
Phishing
Official- looking emails impersonating a well-known source, such as a bank, are frequently sent. It is the purpose of these emails to acquire people’s passwords and credit card information.
Phishing
is another type of malware
spyware
it is an all- encompassing internet ailment that is commonly associated with downloading file pop-ups
spyware
can monitor your keystrokes, read, and destroy your files, reformat your hard drive, and access your apps once it is installed on your computer. Without your knowledge, the individual in charge of the has access to your personal information.
Spyware
which are similar to spyware, record a user’s keyboard operations. The majority of this will hunt for easily identifiable key entries, such as bank card numbers and passwords. Identity and intellectual property theft are frequently tied to
keyloggers
is a more sophisticated form of phishing that takes advantage of the DNS system.
Pharming
frequently construct web pages that look like those of a reputable company, such as an online banking log-in page. Users will then submit their credentials, assuming they are logging in to their regular service, and they will steal their credentials.
Pharming
This is a form of malicious software and internet fraud that misleads users into believing there is a virus on their computer and aims to convince themto pay for a fake malware removal tool that actually installs malware on their computer.
Rogue Security Software
it is a code of appropriate online behavior that is similar to politeness in society. Email, social media, online chat, web forums, website comments, multiplayer gaming, and other forms of online communication are all examples of this.
Netiquette
is defined as the information superhighway. This means that everyone with access to this highway has the ability to place and retrieve information. The larger the risk, the more information you share online. Identity theft, phishing, malware infestations, and other threats are all possible. As a result, Facebook is constantly improving its security features.
Internet
Any information whether recorded in a material form or not, from which the identity of an individual is apparent or can be reasonably and directly ascertained by the entity holding the information, or when put together with other information would directly and certainly identify an individual.
Personal Information
SENSITIVE Personal Information examples
race, ethnicity, marital status, age, color, religious, political affiliation,
3 Data Privacy Principles
Transparency, Legitimate Purpose, Proportionality
A data subject must be aware of the nature, purpose, and extent of the processing of his or her personal data, including the risks and safeguards involved, the identity of personal information controller, his or her rights as a data subject, and how these can be exercised. Any information and communication relating to the processing of personal data should be easy to access and understand, using clear and plain language
Transparency
The processing of information shall be compatible with a declared and specified purpose, which must not be contrary to law, morals, or public policy.
Legitimate Purpos