Module 6 : Security And Safety Flashcards
Attackers
Individuals who launch attacks against other users and their computers
Script kiddies
Individuals who want to attack computers, but lack the knowledge of computers and network needed to do so
Hactivists
Attackers who are strongly motivated by principles or beliefs
Cyberterrorist
Attack a nation’s computer networks, like the electrical power grid to cause disruption and panic among citizens
Nation state actors
?
Insiders
Serious threat to companies that come from their own employers, contractors and business partners
Data mining
Process of sorting through extremely large sets of data to uncover patterns and establish relationships
E-Waste
Electronic waste that are thrown away and end up in a landfill
SEM actions steps
(See picture)
Repetitive strain injury (RSI)
Aches and pains associated with repeated and long-term usage of the devices
Ergonomics
Applied science that specifies the design and arrangement of items that you use so that you and the items interact efficiently and safely
Techology addiction (risk to behavioural health)
When the user is obsessed with using a technology device and cannot walk away from it without feeling extreme anxiety
Cyberbullying (risk to social health)
Bullying that takes place on technology devices like cell phones, computers, and tablets using online social media platforms, public online forums, gaming sites, text messaging or email
Cyberstalking
Involves the use of technology to stalk another person through email, text messages, phone calls and other forms of communication
Malware
Malicious software that can delete or corrupt files and gather personal information.
Software programs that attackers use to enter a computer system without the user’s knowledge or consent and then perform an unwanted and harmful action
Virus
Malicious computer code that, like its biological counterpart, reproduces itself on the same computer
Worm
Malicious program that uses a computer network to replicate