Final Exam Flashcards
Rules or manners for interacting courteously with others online (such as not typing a message in all capital letters, which is equivalent to shouting).
Netiquette
PII is any information specific to an individual.
Personally Identifiable Information (PII)
Willful and repeated harm inflicted through the medium of electronic text, typically through e-mails or on websites (e.g., blogs, social networking sites).
Cyberbullies/cyberbullying
Methods individuals use to track, lure, or harass another person online.
Cyberstalking
Web sites on the worldwide web with hazard conditions to cyber safety.
Risk Sites
An electronic mail message sent from one computer or mobile device to another computer or mobile device.
Electronic mail (e-mail)
A secret word or number that must be used to gain access to an online service or to modify software, such as a parental control.
Password
The process of protecting a system and network against unintended or malicious changes or deletion of information
Cybersecurity
The study of ethics pertaining to computers, covering we use them how we use them; this can affect individuals and society.
Cyber Ethics
The act of circumventing or breaking past security boundaries.
Hacking
A person who engages in hacking
Hacker
ethical and law-abiding
White-hat hacker
operates outside the law
Black-hat hacker
The avenue or path hacker uses to commit the attack.
Attack vector
A malicious software code that is unleashed and attempts to perform its destructive content.
Virus
A attempt to steal, damage, or destroy data or computer system.
Cyberattack
Confidentiality
Integrity
Availability
Are the three underlying principles of data protection.
CIA triad
The condition of being private or secret
Confidentiality
Having important information in the state of being complete or uncorrupted
Integrity
Having access to information when you need it is known as
Availability
This term refers to the weakness of an Asset that can be Exploited by one or more attackers
Vulnerability
Any event that has the potential to bring harm to an organization or individual.
Threat
The potential or loss or damage when a threat exploits a vulnerability
Risk
A computer code intentionally written to cause some form of harm.
Malware
fraudulent attempt to obtain sensitive information or data by disguising oneself as a trustworthy entity in an electronic communication
Phishing
a third party trying to gain access to your systems by cracking a user’s password.
Password Attack
A cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to the Internet.
Denial-of-Service Attack (DDoS)
a type of malware from cryptovirology that threatens to publish the victim’s data or perpetually block access to it unless a ransom is paid.
Ransomware
What do we do with Ransomware?
We don’t pay because the hacker may not give you the info you need to get your file back and may try to force you to pay more money.
Name 1 – 2 types of a cyber attack?
DDOS, Virus, Phishing
This type of Password Attack has a third party trying to guess your password.
Brute Force Password Attack
Examples of Confidentiality attacks
Hacking Encrypted Data, Man in the middle attacks
Examples of Integrity attacks
Remotely controlling zombie system, Maliciously accessing servers and forging records
Examples of Availability attacks
DOS/DDoS Attacks, Flooding a server with too many requests
These two are a list common things you should NEVER do online.
share your password, Posting anything online that you do not want public
What are the three key Goals of Security Measures in Cyber Security?
Prevent ,Detect, and Recover from a problem.
Personal Skills used to communicate and work well with others is known as what?
Soft Skills
In a few words define what is Risk sites?
Web sites on the worldwide web with hazard conditions to cyber/online safety
True or False: The Purpose of Malware is found in its payload.
True
Keylogger
Technology that tracks a user’s keystrokes on the keyboard
Social Engineering
To Trick Someone into doing actions or giving up confidential information to hackers/people.
Cookies
Small files saved on the computer for web browser and websites.
True or False: Trusted Sites Create Cookie Policy that States if the site uses them and how they are being used.
True
Trojan Horse
Malware hidden inside other Software that appears harmless.
True or False: Remote Access Trojan is a malware that allows the hacker to embed a backdoor to gain administrative control over someone computer.
False
Compliance
Following the rules or standards that has been established.
Computer Fraud and Abuse Act (CFAA)
Deals with unauthorized access of computers.
Electronic Communication and Privacy Act (ECPA)
Protects wire and electronic transmissions of data.
Sarbanes-Oxley Act (SOX)
Prevents company executives from hiding or destorying electronic records from a minimum of five years.
Gramm-Leach-Bliley Act (GLBA)
Ensures that financial businesses are protecting your private data.
Health Insurance Portability and Accounting Act (HIPAA)
Protects Electronic Medical Records and Personal Health Information.
Which of the following below are key sign to watch out for when dealing with Phishing.
Select all that apply
Spoofed Email Address, All Caps, Asking your for your PII
What is the name of the Programing Language We use on replit.com?
Python
True or False: 50% of websites online are safe.
False No place is 100% safe online.
Dumpster Diving
One who goes digging through trash for useful information.
Encryption
Data protection technique that includes changing information from its original form to disguised or encoded format
Cipher
A tool used to change normal text into something that is unreadable and then turn back into readable text.
Plaintext
Refers to any text that can be read or written.
Ciphertext
Encoded message
Virtual Machine
Runs a Actual operating system of physical computer.