Module 1 Flashcards

1
Q

Personally Identifiable Information (PII)

A

is any information that can be used to identify someone, like government ID numbers, birthdates, addresses, and phone numbers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Protected Health Information (PHI)

A

is any information added to a person’s medical record during diagnosis or treatment that can be used to identify them, like PII, medical history, prescription lists, photos, and more.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Personally Identifiable Information (PII)

A

is information that identifies a person.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Personal Customer Information (PCI)

A

identifies and describes a customer. It includes many of the same data types as PII, like name, address, contact information, account login, and demographics. It can also include descriptive data like age, gender, job title, and marital status.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Sensitive Personal Information (SPI)

A

is information that does not identify but can cause harm if made public.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

HIPAA

A

The Health Insurance Portability and Accountability Act (HIPAA) regulates the use and disclosure of protected health information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

GDPR

A

General Data Protection
Regulation (GDPR) is a law that regulates digital privacy for all countries in the European Union.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Malware types

A
  • Program Viruses are bits of code that insert themselves into another program
  • Macro Viruses affect Microsoft Office files via the macros they use to automate tasks
  • Stealth Viruses copy themselves to different locations to avoid antivirus scans
  • Polymorphic Viruses change their characteristics to get around cybersecurity defenses (95%)
  • Worms are viruses that start themselves after identifying system weaknesses
  • Trojans trick you into installing legitimate-seeming software that includes harmful malware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Worm

A

A worm can replicate itself from one device to another across a network.
An attacker can use a worm to delete files, steal information, create a backdoor, or distribute other forms of malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Ransomware

A

Ransomware encrypts a user’s files, making it impossible for the user to open them.
The attackers demand payment to release the decryption key that the user will need to gain access to their files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Rootkit

A

A rootkit is a program that provides an attacker with elevated access to a computer.
The program has control over the computer without the user’s or target system’s knowledge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Adware

A

Adware is a type of malware or advertising-supported software that displays unwanted advertisements on your computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Virus

A

A virus attaches to a file that executes when the file is opened.
The virus can move, corrupt, encrypt, or delete data files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

(DDoS) attack:

A

Distributed Denial of Service

When a DoS attack is made with a botnet.
DDoS attack advantages:
- It’s harder to find a DDoS attack’s origin, which makes it harder to shut down
- DDoS attacks are far more devastating than DoS attacks since hundreds or thousands of computers are used instead of just one

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Spyware

A

Collects personal data, login credentials, credit card information, online activity, and can record using a device’s camera microphone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

XSS

A

Cross-site scripting is when an attacker attaches malicious code onto a trusted site. The code activates when the site is loaded by a user.

17
Q

CCI

A

Company confidential information
(CCI) is information about a company’s business processes and other details