Module 1 Flashcards
Personally Identifiable Information (PII)
is any information that can be used to identify someone, like government ID numbers, birthdates, addresses, and phone numbers.
Protected Health Information (PHI)
is any information added to a person’s medical record during diagnosis or treatment that can be used to identify them, like PII, medical history, prescription lists, photos, and more.
Personally Identifiable Information (PII)
is information that identifies a person.
Personal Customer Information (PCI)
identifies and describes a customer. It includes many of the same data types as PII, like name, address, contact information, account login, and demographics. It can also include descriptive data like age, gender, job title, and marital status.
Sensitive Personal Information (SPI)
is information that does not identify but can cause harm if made public.
HIPAA
The Health Insurance Portability and Accountability Act (HIPAA) regulates the use and disclosure of protected health information.
GDPR
General Data Protection
Regulation (GDPR) is a law that regulates digital privacy for all countries in the European Union.
Malware types
- Program Viruses are bits of code that insert themselves into another program
- Macro Viruses affect Microsoft Office files via the macros they use to automate tasks
- Stealth Viruses copy themselves to different locations to avoid antivirus scans
- Polymorphic Viruses change their characteristics to get around cybersecurity defenses (95%)
- Worms are viruses that start themselves after identifying system weaknesses
- Trojans trick you into installing legitimate-seeming software that includes harmful malware
Worm
A worm can replicate itself from one device to another across a network.
An attacker can use a worm to delete files, steal information, create a backdoor, or distribute other forms of malware.
Ransomware
Ransomware encrypts a user’s files, making it impossible for the user to open them.
The attackers demand payment to release the decryption key that the user will need to gain access to their files.
Rootkit
A rootkit is a program that provides an attacker with elevated access to a computer.
The program has control over the computer without the user’s or target system’s knowledge.
Adware
Adware is a type of malware or advertising-supported software that displays unwanted advertisements on your computer.
Virus
A virus attaches to a file that executes when the file is opened.
The virus can move, corrupt, encrypt, or delete data files
(DDoS) attack:
Distributed Denial of Service
When a DoS attack is made with a botnet.
DDoS attack advantages:
- It’s harder to find a DDoS attack’s origin, which makes it harder to shut down
- DDoS attacks are far more devastating than DoS attacks since hundreds or thousands of computers are used instead of just one
Spyware
Collects personal data, login credentials, credit card information, online activity, and can record using a device’s camera microphone