Internet Security Flashcards
refers to the online security or safety of
people and their information when using the internet.
Internet Safety
Is network etiquette, the dos and
don’ts of online communication
Netiquette
is roughly equivalent to privacy.
Confidentiality measures are designed to prevent sensitive information from
unauthorized access attempts.
Confidentiality
involves maintaining the consistency,
accuracy, and trustworthiness of data over its entire lifecycle. Data must not be changed in transit, and steps must be taken to ensure data cannot be altered by unauthorized people
Integrity
means information should be
consistently and readily accessible for
authorized parties. This involves properly
maintaining hardware and technical
infrastructure and systems that hold and
display the information.
Availability
A circumstance or event whereby an entity
gains access to data for which the entity is not authorized.
Unauthorized Disclosure (threat consequence)
A circumstance or event that interrupts or
prevents the correct operation of system services and functions.
Disruption (threat consequence)
A circumstance or event that may result in an authorized entity receiving false data and believing it to be true.
Deception (threat consequence)
A circumstance or event that results in control of system services or functions by an unauthorized entity.
Usurpation (threat consequence)
Sensitive data are directly released to an unauthorized entity.
Exposure (threat action (attack))
An unauthorized entity directly accesses sensitive data traveling between authorized sources and destinations.
Interception (threat action attack)
A threat action whereby an unauthorized entity indirectly accesses sensitive data by reasoning from characteristics or byproducts of communications.
Inference (threat action attack)
An unauthorized entity gains access to sensitive data by circumventing a system’s security protections.
Intrusion (threat action attack)
prevents or interrupts system operation by disabling a system component.
Incapacitation (threat action attack)
undesirably alters system operation by adversely modifying system functions or data.
Corruption (threat action attack)
a threat action that interrupts the delivery of system services by hindering system operation.
Obstruction (threat action attack)
an unauthorized entity gains access to a system or performs a malicious act by posing as an authorized entity.
Masquerade (threat action attack)
of false data deceives an authorized entity.
Falsification (threat action attack)
an entity deceives another by falsely denying responsibility for an act.
Repudiation (threat action attack)
is a person or entity
that pretends to be someone or something else to deceive or gain unauthorized access to computer systems, networks, or information.
Masquerader
Pretending to be an authorized user, administrator, or system to gain access to sensitive information or perform unauthorized actions.
Impersonation
Manipulating network traffic or information to appear as if it’s coming from a trusted source or identity.
Spoofing
Sending deceptive emails or messages that appear to be from legitimate sources to trick recipients into revealing sensitive information like passwords.
Phishing
is an individual who gains
unauthorized access to computer systems or networks to find vulnerabilities, exploit them, or manipulate the systems for various purposes.
Hackers
Individuals who have supervision or
administrative control over the system and misuse the authoritative power given to them.
The misconduct of power is often done
by superlative authorities for financial gains, such a category of intruders is referred to as
Clandestine User
A crime committed or assisted through the use of the Internet.
Cybercrime
This tells the user how the website will handle its data.
Privacy Policy/Terms of Services (ToS)
a file or code, typically delivered over a network, that infects, explores, steals or
conducts virtually any behavior an attacker wants. It is a short term for “malicious software”
Malware
a malicious program designed to transfer from one computer to another in any means possible.
Virus
a malicious program designed to replicate itself and transfer from one file folder to another and also transfer to other computers.
Worms
a malicious program designed that is disguised as a useful program but once downloaded or installed, leaves your PC unprotected and allows hackers to get your information.
Trojan
a program that runs in the background without you knowing it. It has the ability to monitor what you are currently doing and typing through key logging.
Spyware
a program designed to send you advertisement, mostly pop-ups.
Adware
unwanted email mostly from bots or advertisers.
Spam
This form of masquerading acquires sensitive personal information like passwords and credit card details.
Phishing
a type of intellectual property that protects original works of authorship as soon as an author fixes the work in a tangible form of expression.
Copyright
These are tools that record what a person types on a device. While there are legitimate and legal uses for this, many use this for malicious purposes.
Keyloggers
This means that an intellectual property may be used w/o consent as long as it is used in commentaries, criticism, parodies, research, etc.
Fair Use
is a form of malicious software and internet fraud that misleads users into believing that there is a virus on their computer, and manipulates them into paying money for a fake malware removal tool.
Rogue Security Software
is a word or phrase preceded by the “#” symbol (also known as the pound sign or hash symbol) used on social media and other online platforms
hashtag
to categorize content and make it easily discoverable by users interested in specific topics or themes.
hashtag
serve as a way to organize and label content, allowing users to quickly find and engage with posts, photos, videos, and discussions related to a particular subject.
hashtag
is a portmanteau of the
words “ “ and “ “
and it refers to a user-generated classification system or tagging system used to categorize and organize digital content, typically on the internet.
Folk and taxonomy
allows user to categorize
and classify information using freely chosen keywords e.g. tagging by FB, Twitter, using tags that start with the sign #, referred to as hashtag.
Folksonomy