Internet Security Flashcards

1
Q

refers to the online security or safety of
people and their information when using the internet.

A

Internet Safety

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Is network etiquette, the dos and
don’ts of online communication

A

Netiquette

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

is roughly equivalent to privacy.
Confidentiality measures are designed to prevent sensitive information from
unauthorized access attempts.

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

involves maintaining the consistency,
accuracy, and trustworthiness of data over its entire lifecycle. Data must not be changed in transit, and steps must be taken to ensure data cannot be altered by unauthorized people

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

means information should be
consistently and readily accessible for
authorized parties. This involves properly
maintaining hardware and technical
infrastructure and systems that hold and
display the information.

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A circumstance or event whereby an entity
gains access to data for which the entity is not authorized.

A

Unauthorized Disclosure (threat consequence)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A circumstance or event that interrupts or
prevents the correct operation of system services and functions.

A

Disruption (threat consequence)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A circumstance or event that may result in an authorized entity receiving false data and believing it to be true.

A

Deception (threat consequence)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A circumstance or event that results in control of system services or functions by an unauthorized entity.

A

Usurpation (threat consequence)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Sensitive data are directly released to an unauthorized entity.

A

Exposure (threat action (attack))

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An unauthorized entity directly accesses sensitive data traveling between authorized sources and destinations.

A

Interception (threat action attack)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A threat action whereby an unauthorized entity indirectly accesses sensitive data by reasoning from characteristics or byproducts of communications.

A

Inference (threat action attack)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An unauthorized entity gains access to sensitive data by circumventing a system’s security protections.

A

Intrusion (threat action attack)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

prevents or interrupts system operation by disabling a system component.

A

Incapacitation (threat action attack)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

undesirably alters system operation by adversely modifying system functions or data.

A

Corruption (threat action attack)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

a threat action that interrupts the delivery of system services by hindering system operation.

A

Obstruction (threat action attack)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

an unauthorized entity gains access to a system or performs a malicious act by posing as an authorized entity.

A

Masquerade (threat action attack)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

of false data deceives an authorized entity.

A

Falsification (threat action attack)

19
Q

an entity deceives another by falsely denying responsibility for an act.

A

Repudiation (threat action attack)

20
Q

is a person or entity
that pretends to be someone or something else to deceive or gain unauthorized access to computer systems, networks, or information.

A

Masquerader

21
Q

Pretending to be an authorized user, administrator, or system to gain access to sensitive information or perform unauthorized actions.

A

Impersonation

22
Q

Manipulating network traffic or information to appear as if it’s coming from a trusted source or identity.

A

Spoofing

23
Q

Sending deceptive emails or messages that appear to be from legitimate sources to trick recipients into revealing sensitive information like passwords.

A

Phishing

24
Q

is an individual who gains
unauthorized access to computer systems or networks to find vulnerabilities, exploit them, or manipulate the systems for various purposes.

A

Hackers

25
Q

Individuals who have supervision or
administrative control over the system and misuse the authoritative power given to them.

The misconduct of power is often done
by superlative authorities for financial gains, such a category of intruders is referred to as

A

Clandestine User

26
Q

A crime committed or assisted through the use of the Internet.

A

Cybercrime

27
Q

This tells the user how the website will handle its data.

A

Privacy Policy/Terms of Services (ToS)

28
Q

a file or code, typically delivered over a network, that infects, explores, steals or
conducts virtually any behavior an attacker wants. It is a short term for “malicious software”

A

Malware

29
Q

a malicious program designed to transfer from one computer to another in any means possible.

A

Virus

30
Q

a malicious program designed to replicate itself and transfer from one file folder to another and also transfer to other computers.

A

Worms

31
Q

a malicious program designed that is disguised as a useful program but once downloaded or installed, leaves your PC unprotected and allows hackers to get your information.

A

Trojan

32
Q

a program that runs in the background without you knowing it. It has the ability to monitor what you are currently doing and typing through key logging.

A

Spyware

33
Q

a program designed to send you advertisement, mostly pop-ups.

A

Adware

34
Q

unwanted email mostly from bots or advertisers.

A

Spam

35
Q

This form of masquerading acquires sensitive personal information like passwords and credit card details.

A

Phishing

36
Q

a type of intellectual property that protects original works of authorship as soon as an author fixes the work in a tangible form of expression.

A

Copyright

37
Q

These are tools that record what a person types on a device. While there are legitimate and legal uses for this, many use this for malicious purposes.

A

Keyloggers

38
Q

This means that an intellectual property may be used w/o consent as long as it is used in commentaries, criticism, parodies, research, etc.

A

Fair Use

39
Q

is a form of malicious software and internet fraud that misleads users into believing that there is a virus on their computer, and manipulates them into paying money for a fake malware removal tool.

A

Rogue Security Software

40
Q

is a word or phrase preceded by the “#” symbol (also known as the pound sign or hash symbol) used on social media and other online platforms

A

hashtag

41
Q

to categorize content and make it easily discoverable by users interested in specific topics or themes.

A

hashtag

42
Q

serve as a way to organize and label content, allowing users to quickly find and engage with posts, photos, videos, and discussions related to a particular subject.

A

hashtag

43
Q

is a portmanteau of the
words “ “ and “ “

and it refers to a user-generated classification system or tagging system used to categorize and organize digital content, typically on the internet.

A

Folk and taxonomy

44
Q

allows user to categorize
and classify information using freely chosen keywords e.g. tagging by FB, Twitter, using tags that start with the sign #, referred to as hashtag.

A

Folksonomy