Module 6 : Security And Safety Flashcards

1
Q

Attackers

A

Individuals who launch attacks against other users and their computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Script kiddies

A

Individuals who want to attack computers, but lack the knowledge of computers and network needed to do so

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Hactivists

A

Attackers who are strongly motivated by principles or beliefs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cyberterrorist

A

Attack a nation’s computer networks, like the electrical power grid to cause disruption and panic among citizens

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Nation state actors

A

?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Insiders

A

Serious threat to companies that come from their own employers, contractors and business partners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data mining

A

Process of sorting through extremely large sets of data to uncover patterns and establish relationships

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

E-Waste

A

Electronic waste that are thrown away and end up in a landfill

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SEM actions steps

A

(See picture)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Repetitive strain injury (RSI)

A

Aches and pains associated with repeated and long-term usage of the devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Ergonomics

A

Applied science that specifies the design and arrangement of items that you use so that you and the items interact efficiently and safely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Techology addiction (risk to behavioural health)

A

When the user is obsessed with using a technology device and cannot walk away from it without feeling extreme anxiety

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cyberbullying (risk to social health)

A

Bullying that takes place on technology devices like cell phones, computers, and tablets using online social media platforms, public online forums, gaming sites, text messaging or email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Cyberstalking

A

Involves the use of technology to stalk another person through email, text messages, phone calls and other forms of communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Malware

A

Malicious software that can delete or corrupt files and gather personal information.
Software programs that attackers use to enter a computer system without the user’s knowledge or consent and then perform an unwanted and harmful action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Virus

A

Malicious computer code that, like its biological counterpart, reproduces itself on the same computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Worm

A

Malicious program that uses a computer network to replicate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Trojan

A

Malware that hides inside another program, often one downloaded from the web

19
Q

Ransomware

A

Prevents a user’s device from properly and fully functioning until a fee is paid

20
Q

Address spoofing

A

An attack that changes the device’s address settings

21
Q

Social engineering

A

Category of attacks that attempt to trick the victim into giving valuable information to the attacker

22
Q

Phishing

A

Sending an email or displaying a web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into giving private information

23
Q

Hoax

A

False warning, often contained in an email messgae that pretends to come from a valid source like the company’s IT department

24
Q

Spam

A

Unwanted email messages sent from an unknown sender to many email accounts, usually advertising a product or service such as interest loans

25
Q

Surge protector

A

Can defend computer equipment from spikes, surges and noise

26
Q

Uninterruptible power supply (UPS)

A

Positioned between computer and electrical outlet
It contains a battery that maintains power to the equipment for a short time in case of an interruption in the primary electrical power source

27
Q

Security features for recovery of stolen device

A

(See picture)

28
Q

Data backup

A

Means copying files from a computer’s hard drive that are then stored in a remote location
Protect against hardware malfunctions

29
Q

Wi-Fi

A

Wireless data network technology that provides high-speed data connections for mobile devices

30
Q

Wireless routers

A

This central connection device needed for a home-based Wifi network combines several networking technologies

31
Q

Privacy

A

State or condition of being free from public attention to the degree that you determine

32
Q

Authentication

A

Process of ensuring that the person requesting access to a computer or other resources is authentic, and not an imposter

33
Q

Password

A

Secrete combination of letters, numbers and/or characters that only the user should have knowlegde of

34
Q

Weak password

A

Common word as a password, short word, predictable sequence of characters or personal information in a password

35
Q

Strong password

A

Longer combination of letters, numbers and/or symbols that unlocks access to protected electronic data

36
Q

Password manager

A

Program installed on your computer or mobile device

37
Q

Biometric security

A

Uses unique characteristics of your face, hands or eyes to authenticate you

38
Q

Two factor authentication

A

Combine multiple types of authentication

Often used with passwords and the approved user having a specific item in his possession that no one else would have

39
Q

Encryption

A

“Scrambling” information in such a way that it cannot be read unless the user possesses the “key” to unlock it back to readable format

40
Q

Decryption

A

Readable format

41
Q

Digital certificate

A

Technology used to verify a user’s identity and key that has been “signed” by a trusted third party

42
Q

Identity theft

A

Using someone’s personal information, such as name, credit card number, to commit financial fraud

43
Q

How personal info is stolen

A

(See picture)

44
Q

Cookie

A

File created by a website that stores information on your computer, such as website preferences