Lesson 6: Digital Security, Ethics, and Privacy: Avoiding and Recognizing Threats Flashcards

1
Q

Protection from hostile forces that intend to compromise the normal state of being of something

A

Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Computer Security and Cybersecurity aims to preserve these three things (CIA):

A

Confidentiality of Data
Integrity of Data
Availability of Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The state of being safe from malicious actors

A

Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Any event or action that could cause a loss of or damage to computer or mobile device hardware, software, data, information, or processing ability

A

Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

______ is meant to be taken, while ________ is the holistic goal of every computer administrator / owner.

A

Risk…security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An intentional breach of digital security often involves a deliberate act that is against the law

A

Cybercrime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A formal and umbrella term for anyone who maliciously acts upon a computer system

A

Threat actors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Individuals who want to attack computers but lack the knowledge and networks needed to do so

A

Script Kiddies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Usually downloads pre-made hacking tools coded by other hackers

A

Script Kiddies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A threat actor that breaks through a computer security without required permission

A

Hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Someone who accesses a computer or network illegally but has the intent of destroying data, stealing information, or other malicious actions

A

Cracker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Attacks a nation’s national computer systems, mostly power grids and tech infrastructure that comprises national security, to instill fear and insecurity

A

Cyberterrorists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Threaten to expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization’s network - if they are not paid a sum of money

A

Cyberextortionist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A common way to trick people to entering their passwords and other info to websites controlled by threat actors

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An Act Defining Cybercrime, Providing for the Prevention, Investigation, Suppression and the Imposition of Penalties Therefor and for Other Purposes

A

RA 10175 - Anti-Cybercrime Act of 2012

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Is the discovery, collection, and analysis of evidence found on computers and networks

A

Digital Forensics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Involves the examination of media, program, data, and log files on computers, mobile devices, servers, and networks

A

Digital Forensics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A contraction of the words “malicious” and “software”

A

Malware

19
Q

A general term for software that is intended to disrupt computer security

A

Malware

20
Q

Also called a zombie army

A

Botnets

21
Q

A group of compromised computers or mobile devices connected to a network, often used to attack other networks

A

Botnets

22
Q

Usually being used in:
• Automated Troll Farms
• Illegal Crypto Mining
• DDoS Attacks
• and many more that require intensive computing resources

A

Botnets

23
Q

A type of attack, usually on a server, that is meant to overload the server with network traffic so that it cannot provide necessary services

A

Denial of Server (DoS)

24
Q

When executed via botnets, DoS is called

A

Distributed DoS (DDoS)

25
Q

A program or set of instructions in a program that allows users to bypass security controls when accessing a program, computer, or network

A

Backdoor

26
Q

A technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network

A

Spoofing

27
Q

Make it look like a user uses a website safely, but deep inside the computer, malicious code is running that compromises the user’s network and information security

A

Spoofing

28
Q

Is a category of attacks that attempts to trick the victim into giving valuable information to the attacker

A

Social Engineering

29
Q

Relies on an attacker’s clever manipulation of human nature in order to persuade the victim to provide information or take actions

A

Social Engineering

30
Q

Detects and automatically takes action against malicious code that attempts to run through a computer

A

Antivirus

31
Q

Default Antivirus for Windows OS

A

Windows Defender

32
Q

Protects network resources from outsiders and to restrict employee’s access to sensitive data

A

Firewall

33
Q

Stop malicious intrusions before they attempt to affect your computer or network

A

Firewall

34
Q

A private, secure path across a public network that allows authorized users secure access to a company or other network

A

Virtual Private Networks (VPN)

35
Q

Help ensure that data is safe from being intercepted by unauthorized people by encrypting data as it transmits from a laptop, smartphone, or other mobile device

A

Virtual Private Networks (VPN)

36
Q

Prevent other users from accessing your computer by implementing access controls

A

Proper Access Controls

37
Q

Remove Guest User Profiles from your computer which could be a way in for an unknown user to upload malicious code in person/manually

A

Proper Access Controls

38
Q

If your data is backed up, threats of a cyberextortionist/cracker deleting the data won’t be a huge deal

A

Data Backups

39
Q

Perform backups regularly – a healthy frequency is 1 to 2 months

A

Data Backups

40
Q

Having a synced cloud storage even reduces the risk of data not being backed up

A

Data Backups

41
Q

A WiFi access point of the same name as the one existing in public

A

Avoid Evil Twins

42
Q

A period of time during which an individual refrains from using technology

A

Digital Detox

43
Q
  1. Strong Passwords
  2. Two-Factor Authentication
  3. Biometrics
  4. Captcha
  5. Encryptions
A

Information Privacy