Privacy/Security Flashcards

1
Q

A marketplace where both parties tend to know the same amount about each other.

A

Symmetric Marketplace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A marketplace where one party knows more about the other.

A

Asymmetric Marketplace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

PIPEDA

A

Personal Information Protection and Electronic Documents Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Hidden data attached to the posts by online services used and online requests made.

A

Data footprints

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The process of extracting and discovering patterns in large data sets

A

Data Mining

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Three things used in data mining:

A

1) Machine Learning
2) Statistics
3) Databases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data about data.

A

Metadata

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What filename specifies areas of a website that should not be processed or scanned by a web crawler?

A

robots.txt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A program that gathers information across billions of websites for indexing.

A

Web Crawlers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Encryption where both the sender and receiver use the same key.

A

Symmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Encryption key and decryption key are different.

A

Public or Asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Produces a number that is sensitive to the slightest change in data stream.

A

Hashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A case of unauthorized access.

A

Security Breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Undesired software injected into a system without consent.

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A malicious program that runs on a computer without permission and attempts to spread itself.

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A malicious program that is self-replicating and spreads throughout a network without human assistance.

A

Worm

17
Q

Difference between a virus and a worm?

A

Virus requires a host computer/OS, whereas a worm works alone.

18
Q

A malicious program that is executed by the user.

A

Trojan

19
Q

A program that writes to the buffer with intentions of reaching other areas of memory

A

Buffer Overflow

20
Q

Software that blocks unauthorized communication over the network.

A

Firewall

21
Q

A file or document that verifies the identity of a device or server to prove ownership of a public key.

A

Digital Certificate

22
Q

The icon used with digital certificates.

A

Padlock