Module H Flashcards

1
Q

This is the practice of protecting computer systems, networks, and programs from digital attacks, damage, or unauthorized access.

A

Cybersecurity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

It involves implementing measures, protocols, and technologies to ensure the?

A
  • Confidentiality
  • Integrity
  • Availability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the CIA Triad of Information Security?

A
  • Confidentiality
  • Integrity
  • Availability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the Categories of Cybercrime?

A
  • Computer as the Target
  • Computer as the Weapon
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Computer is used to attack another computer. E.g. hacking, viruses, worms, DoS attacks

A

Computer as the Target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Computer is used to commit real-world crime. E.g. credit card fraud

A

Computer as the Weapon

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

This refers to the unauthorized access, manipulation, or exploitation of computer systems, networks, or data usually in a large organization such as the government.

A

Hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Ethical hacking where individuals use their skills to find and fix security vulnerabilities

A

White Hat Hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A darker side of hacking, involving individuals or groups who exploit vulnerabilities for malicious purposes.

A

Black Hat Hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

This is a digital version of fishing where cybercriminals are attempting to lure people into revealing sensitive information, such as passwords or credit card numbers.

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

This can be done through deceptive emails or messages.

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Short for ‘voice phishing,’ which involves defrauding people over the phone, enticing them to divulge sensitive information.

A

Vhishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

This uses fake mobile text messages to trick people

A

Smishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The attacker lures the recipient into clicking on a link or attachment leading them to a fraudulent site that captures their sensitive information.

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The attacker attempts to grab the victims’ data and use it to their own benefit - typically, to gain financial advantage

A

Vhishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

This attack is a digital traffic jam that disrupts the normal functioning of a computer system, network, or website.

A

Denial of Service (DoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The perpetrator overwhelms the target with a flood of traffic, making it unable to respond to legitimate requests.

A

Denial of Service (DoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

These are unsolicited and often irrelevant messages sent in bulk to a large number of recipients.

A

Spam Email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

This is a broad term that encompasses various types of harmful software designed to disrupt, damage, or gain unauthorized access to computer systems, usually for financial gains.

A

Malwares or Malicious software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

These attach themselves to clean files and spread when the infected file is executed.

A

Viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Self-replicating and capable of spreading across networks without human intervention.

A

Worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Disguised as legitimate software. This malware deceives users into installing them, allowing malicious activities.

A

Trojans

23
Q

Encrypts files on a user’s system, demanding payment (often in cryptocurrency) for their release.

A

Ransomware

24
Q

Stealthily monitors and collects information about a user’s activities without their knowledge.

A

Spyware

25
Q

Bombards endless ads and pop-up windows that could potentially be dangerous for your device

A

Adware

26
Q

It is the art of manipulating people so they give up confidential information.

A

Social Engineering

27
Q

This is the act of pretending to be someone you’re not online, usually with the intention of deceiving others, often for personal gain, emotional manipulation, or even just to create a false persona.

A

Catfishing

28
Q

The term originally referred to the practice of using fake profiles to lure people into romantic or social relationships, but it can also extend to other forms of online deception

A

Catfishing

29
Q

When an adult tries to build an online relationship with a child so that they can sexually exploit them

A

Online Grooming

30
Q

This involves installing a small device, called a skimmer, on an ATM to secretly collect data from the magnetic stripe of debit or credit cards.

A

ATM Skimming

31
Q

What is the small device used in ATM Skimming?

A

Skimmer

32
Q

It monitors and controls incoming and outgoing network traffic, deciding which data packets can enter or leave based on predetermined security rules.

A

Firewalls

33
Q

It detects, prevents, and removes malicious software (malware) to keep your system healthy.

A

Antivirus Softwares

34
Q

It encrypts your internet connection, enhancing privacy and security, especially when you’re using public Wi-Fi.

A

Virtual Private Networks (VPNs)

35
Q

It monitors network or system activities for suspicious behavior and alerts administrators to potential threats.

A

Intrusion Detection Systems (IDS)

36
Q

It is a digital translator that converts sensitive information into a secret code.

A

Encryption Tools

37
Q

It generates complex passwords, reducing the risk of unauthorized access to your accounts.

A

Password Managers

38
Q

It collects and analyzes log data from various systems, providing a comprehensive view of an organization’s security posture.

A

Security Information and Event Management (SIEM) Systems

39
Q

It requires users to provide more than one form of identification (e.g., password and fingerprint) before granting access.

A

Multi-Factor Authentication (MFA)

40
Q

What are the Advantages of Cybersecurity?

A
  1. It defends us from hacks and viruses. It helps us browse websites safely.
  2. It processes all the incoming and outgoing data on our computer.
  3. It defends us from critical online attacks.
  4. It forces the applications in a computer to be updated regularly.
  5. It detects the emergence of new viruses when the database is updated.
41
Q

What are the Safety Tips for Cybercrime?

A
  1. Use anti-virus software.
  2. Insert firewalls.
  3. Uninstall unnecessary software.
  4. Maintain backup.
  5. Check security settings.
  6. Never provide full name, address, or other personal information to strangers.
  7. Learn more about internet privacy.
42
Q

Simulation of human intelligence processes by machines, especially computer systems.

A

Artificial Intelligence (AI)

43
Q

Designed for a particular task (e.g., virtual assistants).

A

Narrow AI (Weak AI)

44
Q

Capable of understanding, learning, and performing any intellectual task that a human can

A

General AI (Strong AI)

45
Q

AI raises ethical issues, such as decision-making accountability and the moral implications of autonomous systems

A

Ethical Concerns

46
Q

AI systems can inherit biases from their training data, leading to unfair or discriminatory outcomes.

A

Bias in Algorithms

47
Q

Automation by AI threatens employment in various sectors, impacting livelihoods and economies.

A

Job Displacement

48
Q

Many AI models, particularly deep learning, function as “black boxes,” making it difficult to understand their decision-making processes.

A

Lack of Transparency

49
Q

AI’s reliance on vast amounts of data poses risks of breaches, misuse, and privacy violations.

A

Data Privacy and Security

50
Q

Governments face difficulties in creating frameworks that ensure AI is used responsibly while fostering innovation

A

Regulatory Challenges

51
Q

It is often challenging to explain how and why AI systems arrive at specific conclusions, undermining trust.

A

Explainability and Interpretability

52
Q

The militarization of AI raises concerns about autonomous weapons and their potential to escalate conflicts or cause unintended harm.

A

AI in Warfare

53
Q

What are the Notable uses of AI nowadays?

A
  • Machine learning
  • Fraud detection
  • Health scans and imaging
  • Customer relations management
  • Marketing optimization
  • Data analysis