Final Exam Flashcards
Rules or manners for interacting courteously with others online (such as not typing a message in all capital letters, which is equivalent to shouting).
Netiquette
PII is any information specific to an individual.
Personally Identifiable Information (PII)
Willful and repeated harm inflicted through the medium of electronic text, typically through e-mails or on websites (e.g., blogs, social networking sites).
Cyberbullies/cyberbullying
Methods individuals use to track, lure, or harass another person online.
Cyberstalking
Web sites on the worldwide web with hazard conditions to cyber safety.
Risk Sites
An electronic mail message sent from one computer or mobile device to another computer or mobile device.
Electronic mail (e-mail)
A secret word or number that must be used to gain access to an online service or to modify software, such as a parental control.
Password
The process of protecting a system and network against unintended or malicious changes or deletion of information
Cybersecurity
The study of ethics pertaining to computers, covering we use them how we use them; this can affect individuals and society.
Cyber Ethics
The act of circumventing or breaking past security boundaries.
Hacking
A person who engages in hacking
Hacker
ethical and law-abiding
White-hat hacker
operates outside the law
Black-hat hacker
The avenue or path hacker uses to commit the attack.
Attack vector
A malicious software code that is unleashed and attempts to perform its destructive content.
Virus
A attempt to steal, damage, or destroy data or computer system.
Cyberattack
Confidentiality
Integrity
Availability
Are the three underlying principles of data protection.
CIA triad
The condition of being private or secret
Confidentiality
Having important information in the state of being complete or uncorrupted
Integrity
Having access to information when you need it is known as
Availability
This term refers to the weakness of an Asset that can be Exploited by one or more attackers
Vulnerability
Any event that has the potential to bring harm to an organization or individual.
Threat
The potential or loss or damage when a threat exploits a vulnerability
Risk
A computer code intentionally written to cause some form of harm.
Malware