Module 6 : Security And Safety Flashcards

1
Q

Attackers

A

Individuals who launch attacks against other users and their computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Script kiddies

A

Individuals who want to attack computers, but lack the knowledge of computers and network needed to do so

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Hactivists

A

Attackers who are strongly motivated by principles or beliefs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cyberterrorist

A

Attack a nation’s computer networks, like the electrical power grid to cause disruption and panic among citizens

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Nation state actors

A

?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Insiders

A

Serious threat to companies that come from their own employers, contractors and business partners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data mining

A

Process of sorting through extremely large sets of data to uncover patterns and establish relationships

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

E-Waste

A

Electronic waste that are thrown away and end up in a landfill

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SEM actions steps

A

(See picture)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Repetitive strain injury (RSI)

A

Aches and pains associated with repeated and long-term usage of the devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Ergonomics

A

Applied science that specifies the design and arrangement of items that you use so that you and the items interact efficiently and safely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Techology addiction (risk to behavioural health)

A

When the user is obsessed with using a technology device and cannot walk away from it without feeling extreme anxiety

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cyberbullying (risk to social health)

A

Bullying that takes place on technology devices like cell phones, computers, and tablets using online social media platforms, public online forums, gaming sites, text messaging or email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Cyberstalking

A

Involves the use of technology to stalk another person through email, text messages, phone calls and other forms of communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Malware

A

Malicious software that can delete or corrupt files and gather personal information.
Software programs that attackers use to enter a computer system without the user’s knowledge or consent and then perform an unwanted and harmful action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Virus

A

Malicious computer code that, like its biological counterpart, reproduces itself on the same computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Worm

A

Malicious program that uses a computer network to replicate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Trojan

A

Malware that hides inside another program, often one downloaded from the web

19
Q

Ransomware

A

Prevents a user’s device from properly and fully functioning until a fee is paid

20
Q

Address spoofing

A

An attack that changes the device’s address settings

21
Q

Social engineering

A

Category of attacks that attempt to trick the victim into giving valuable information to the attacker

22
Q

Phishing

A

Sending an email or displaying a web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into giving private information

23
Q

Hoax

A

False warning, often contained in an email messgae that pretends to come from a valid source like the company’s IT department

24
Q

Spam

A

Unwanted email messages sent from an unknown sender to many email accounts, usually advertising a product or service such as interest loans

25
Surge protector
Can defend computer equipment from spikes, surges and noise
26
Uninterruptible power supply (UPS)
Positioned between computer and electrical outlet It contains a battery that maintains power to the equipment for a short time in case of an interruption in the primary electrical power source
27
Security features for recovery of stolen device
(See picture)
28
Data backup
Means copying files from a computer’s hard drive that are then stored in a remote location Protect against hardware malfunctions
29
Wi-Fi
Wireless data network technology that provides high-speed data connections for mobile devices
30
Wireless routers
This central connection device needed for a home-based Wifi network combines several networking technologies
31
Privacy
State or condition of being free from public attention to the degree that you determine
32
Authentication
Process of ensuring that the person requesting access to a computer or other resources is authentic, and not an imposter
33
Password
Secrete combination of letters, numbers and/or characters that only the user should have knowlegde of
34
Weak password
Common word as a password, short word, predictable sequence of characters or personal information in a password
35
Strong password
Longer combination of letters, numbers and/or symbols that unlocks access to protected electronic data
36
Password manager
Program installed on your computer or mobile device
37
Biometric security
Uses unique characteristics of your face, hands or eyes to authenticate you
38
Two factor authentication
Combine multiple types of authentication | Often used with passwords and the approved user having a specific item in his possession that no one else would have
39
Encryption
“Scrambling” information in such a way that it cannot be read unless the user possesses the “key” to unlock it back to readable format
40
Decryption
Readable format
41
Digital certificate
Technology used to verify a user’s identity and key that has been “signed” by a trusted third party
42
Identity theft
Using someone’s personal information, such as name, credit card number, to commit financial fraud
43
How personal info is stolen
(See picture)
44
Cookie
File created by a website that stores information on your computer, such as website preferences