INFORMATION PROTECTION AND SECURITY Flashcards

1
Q

a person who breaks in to a security system only with a malicious intent. A person who breaks in to a computer system for the purpose of earning profit, finding security loopholes of the system, showing protest or just for the sake of challenge is called a hacker. In recent times the differentiation between the definitions of the two terms has become vague due to the misuse of them by the mass media and the existence of the people belonging to both
categories.

A

Cracker(BREAK)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

_______ build, while crackers break.

A

Hackers(BUILD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

FRAUD TYPES

A

Skimming
Phishing
Pharming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

where the card is cloned

A

Skimming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

technique used to obtain your card and personal details
through a fake email

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

a similar technique using fake websites, such as imitating a
bank’s website

A

Pharming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Attack through which a person can render a system unusable or significantly slow down the system for legitimate users by overloading the system so that no one else can use it.

A

Denial of Service (DOS) Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ACTS OF UNLAWFUL INTERFERENCE (7)

A

 Unlawful seizure of aircraft,
 Destruction of an aircraft in service,
 Hostage-taking on board aircraft or on aerodromes,
 Forcible intrusion on board an aircraft, at an airport or on the premises of an aeronautical facility,
 Introduction on board an aircraft or at an airport of a weapon or hazardous device or material
intended for criminal purposes,
 Use of an aircraft in service for the purpose of causing death, serious bodily injury, or serious
damage to property or the environment,
 Communication of false information such as to jeopardize the safety of an aircraft in
flight or on the ground, of passengers, crew, ground personnel on the general public,
at an airport or on the premises of a civil aviation facility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

has dual requirements of protection of the ATM system against threats and vulnerabilities and the provision of ATM security services in support of organizations and authorities engaged in aviation security, national security, defense, and law enforcement.

A

ATM security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ATM SYSTEM INFRASTUCTURE PROTECTION

A

Facility physical security and access control
(ATM facility design considerations, NAVAIDs, etc.)

Personnel security program
(position risk categorization, personnel screening and vetting, third-party personnel security, etc.)

Information and Communication Technology (ICT)
system security (unauthorized access, tampering with the systems, attacks on the systems)

Contingency planning for ATM security
(planning, system degradation to a safe/secure situation, service continuity, recovery, maintenance of plans)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ATM SECURITY OPERATIONS

A

ATM contribution to safeguarding against unlawful
interference

ATM support for law enforcement
(e.g. laser threats, man portable air defence system threats)

Disasters and public health emergencies
(e.g. disaster response and recovery, communicable disease and other public health risks on board aircraft)

Airspace management for ATM security
(monitoring and reporting over security identification zones, emergency security control of air traffic, creation and monitoring of temporary airspace/flight restrictions)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ICAO HEADQUARTES AND BRANCHES

A

MONTREAL, CANADA (HEADQUARTERS)
MEXICO CITY (NORTHAMERICA AND CARIBBEAN)
LIMA (SOUTH AMERICA)
PARIS (EUROPEAN AND NORTHATLANTIC)
DAKAR (WESTERN AFRICA)
CAIRO (MIDDLE EAST)
NAIROBI (EASTERN AFRICA)
BEIJING (ASIA-PACIFIC SUB OFFICE)
BANGKOK (ASIA-PACIFIC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The Aviation Cybersecurity Strategy (7)

A

International Cooperation
Governance
Effective Legislation & Regulations
Cybersecurity Policy
Information Sharing
Incident Management & Emergency Planning
Capacity Building, Training, & Cybersecurity Culture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Cyber Threats are ______, _______ and ________

A

BORDERLESS, COMPLEX, and AGILE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Digitalization is _____ to Civil Aviation ________ and Future Development Across _______

A

KEY, INTEROPERABILITY , ALL DOMAINS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

a set of principles and practices designed to safeguard your computing assets and online information against THREATS

A

CYBERSECURITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

refers to criminal activities that specifically target a computer or network for damage orinfiltration.

A

CYBERCRIME

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

is a deliberate exploitation of computer systems, technology dependent enterprises, and networks.

it uses malicious code to alter computer code, logic, or data, resulting in disruptive consequences that can compromise data and lead to cyber-crimes, such as information and identity theft.

A

CYBERATTACK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively. When something is private to a person, it usually means that something is inherently special or sensitive to them.

A

PRIVACY

20
Q

WAYS OF PROTECTING INFORMATIONS

A

ANTI VIRUS SOFTWARE
TRUSTED SOFTWARE
UPDATED SOFTWARE
FIREWALL
BACKUP FILES

21
Q

also known as internet privacy or digital privacy, refers to how much of your personal, financial and browsing information remains private when you’re online.

A

ONLINE PRIVACY

22
Q

is the need to preserve and protect any personal data being collected by any organization.

A

DATA PRIVACY

23
Q

information or an opinion forming part of a database, whether true or not, and whether recorded in a material form or not, about an individual whose identity is apparent,
or can reasonably be ascertained, from the information.

A

PERSONAL INFORMATION

24
Q

DATA PRIVACY RIGHTS

A

THE RIGHT TO:
INFORM
ACCESS
OBJECT
ERASE OR BLOCK
RECTIFY
DAMAGES
FILE A COMPLAINT

25
Q

CYBERSECURITY SCOPE:

A

-Physical Security
-Data Security
-Security roles, responsibilities,
and accountabilities
-Risk Management
-Education and
training
-Monitoring
-Recovery

26
Q

AIR TRANSPORT ECOSYSTEM:

A

ATM, AIRCRAFT AND AIRPORT

27
Q

GLOBAL CYBER TRENDS:

A

More users and devices
Wider networks and faster connections
Easier data storage and new efficient data types
More usages and new services
Less isolated architectures
Quick adoption of new technologies

28
Q

WHAT ARE THE COMMON CYBERTHREATS?

A

-Malware
-Hacking
-Social Engineering
-Ransomware
-Man in the Middle ( MitM)
-phishing
-The DOS (Denial of Service)
- Identity Theft
-Sextortion
-Password Attack
1. brute force attack
2. dictionary attack
3. keylogging

29
Q

malicious software intended to damage or disable computers and computer systems.

A

Malware

30
Q

unauthorized access to data in a system, to steal information, exchange of data, and damage data.

A

Hacking

31
Q

is an art of exploiting human psychology, rather than technical hacking techniques, to gain access to buildings, systems or data.

A

Social Engineering

32
Q

is a subset of malware in which the data on a victim’s computer is locked, typically by encryption, and payment is demanded before the ransomed data is decrypted and access returned to the victim.

A

Ransomware

33
Q

attack is when an attacker intercepts communications between two parties either to secretly eavesdrop or modify traffic traveling between the two. Attackers might use MitM attacks to steal login credentials or personal information, spy on the victim, or sabotage communications or corrupt data.

A

Man in the Middle ( MitM)

34
Q

involves running through as many combinations
of potential passwords as necessary to hit on the right one.

A

brute force attack

35
Q

common passwords is used to attempt to gain access to a user’s computer and network

A

dictionary attack

36
Q

relies on getting a piece of malware onto your
computer that watches what you’re doing and keeps track of what you type, sending that information to a hacker.

A

keylogging

37
Q

trick users into clicking on malicious links or opening
unknown attachments for them to provide sensitive data, such as personal identifiable information, financial details, and passwords.

A

phishing

38
Q

attack typically uses one computer and one internet connection to flood a targeted system or resource.

A

The DOS (Denial of Service)

39
Q

is using other people’s personal identity without authorization for personal motives and do harm

A

Identity Theft

40
Q

sexual exploitation in which threatened release of sexual
images or information is the means of coercion.

A

Sextortion

41
Q

ELECTRONIC COMMERCE ACT OF 2000
aims to facilitate domestic and international dealings, transactions, arrangements agreements, contracts and exchanges and storage of information through the utilization of electronic, optical and similar medium, mode, instrumentality and technology to recognize the authenticity and reliability of electronic documents related to such activities and to promote the universal use of electronic transaction in the government and general public

A

REPUBLIC ACT NO. 8792

42
Q

ANTI-CHILD PORNOGRAPHY ACT OF 2009
Guarantee the fundamental rights of every child from all forms of neglect, cruelty and other conditions prejudicial to their development;
Protect the child from all forms of exploitation and abuse including, but not limited to:
(1) the exploitative use of a child or children in pornographic performances and materials;
and
(2) the inducement or coercion of a child to engage in or perform any sexual activity or
practices, through whatever means;

A

REPUBLIC ACT NO. 9775

43
Q

ANTI-PHOTO AND VIDEO VOYEURISM ACT OF 2009
The law prohibits recording videos or taking photos of a sexual act, the male or female genitalia, and of the female breast, among others, without consent of the persons featured in the material.

A

REPUBLIC ACT NO. 9995

44
Q

DATA PRIVACY ACT OF 2012
To protect the fundamental human right of privacy, of communication while ensuring free flow of information to promote innovation and growth. An act protecting individual personal information in information and communications systems in the government and the private sector, creating for this purpose a national privacy commission, and for other purposes.

A

REPUBLIC ACT NO. 10173

45
Q

CYBERCRIME PREVENTION ACT OF 2012
punishes content-related offenses such as cybersex, child pornography and libel which may be committed through a computer system. It also penalizes unsolicited commercial communication or content that advertises or sells products or services.

A

REPUBLIC ACT NO. 10175

46
Q

Top Cyber Threats in the Philippines
during the Pandemic

A

FAKE NEWS
SOCIAL MEDIA SCAM
PHISHING

47
Q
A