Security and Safety Flashcards
Hazards to our physical bodies include
Eye strain from viewing the computer screen in poor light, poor posture when using devices, or muscle fatigue that comes from typing on a keyboard.
A common term used to describe individuals who launch attacks against other users and their computers is
Attackers or threat actor
Attackers in organized gangs meet in
hidden online “dark web” forums
When organized gangs of young attackers meet online they
Trade information, buy and sell stolen data and attacker tools, and even coordinate their attacks.
Are individuals who want to attack computers, but lack the knowledge of computers and networks needed to do so.
Script kiddies
Work by downloading freely available automated attack software (scripts) from websites and using it to perform malicious acts
Script kiddies
Are attackers who are strongly motivated by principles or beliefs.
Hactivists
Can involve breaking into a website and changing the contents on the site as a means of making a political statement.
Attacks by hactivists
Attack a nation’s computer networks, like the electrical power grid, to cause disruption and panic among citizens.
Cyberterrorists
Instead of using an army to strike at an adversary, governments are now employing state-sponsored attackers to launch computer attacks against their enemies through
Nation state actors
Another serious security threat to companies can come from its own employees, contractors, and business partners, called
Insiders
A healthcare worker upset about being passed over for a promotion might illegally gather health records on celebrities and sell them to the media. This is an example for a/n
Insiders
The greatest risk comes from attackers who want to steal information for
their own financial gain
Once, the reason for launching computer attacks was for the attackers to
show off their technology skills (fame)
Where do you face risks when using the internet or email
Online banking
E-commerce shopping
Fake websites
Social media sites
Attackers try to steal your password to access your online bank account and transfer your money overseas.
Online banking
Rrisks you face online when using the internet or email
Online banking
E-commerce shopping
Fake websites
Social media sites
When you enter your credit card number to make an online purchase an attacker can try to intercept your card number as it is transmitted over the network
E-commerce shopping
Attackers can set up an “imposter” website that looks just like the site where you pay your monthly credit card bill.
Fake websites
Attackers can ask to be a “friend” on your social media site by pretending to be someone you met or went to school with. Once you accept this new friend the attacker may be able to see personal information about you, such as your pet’s name or your favorite vacation spot. This information could be used to reset your password on another website that requires the answer to the security questions
Social media sites
Gathering your personal information is not something that is done only by attackers it can be done and used by
Organizations such as schools and hospitals
Sell your information to a drug company who sends you information about their drugs
Invalid use by hospitals
Refers your past procedures when you are admitted as a patient
Valid use by hospitals
The process of sorting through extremely large sets of data to uncover patterns and establish relationships
Data mining which many organizations use
Most data mining tools allow organizations to
predict future trends
- Give only necessary information when completing an online form or a warranty.
- Review the information that online sites such as Google have stored about you.
- Request to be removed from mailing lists.
- Create another email account to use when a merchant or website requires an address.
- Do not use your social media account login information to log in to another site.
Tips for protecting personal information that is gathered by legitimate organizations include
Eelectronic waste
e-waste
Americans generate over 9.4 million tons of e-waste each year
Contaminate the ground and water supply, causing harm to the environment
Toxic metals, such as lead and mercury
Promotes the reduction of e-waste
Sustainable Electronics Management (SEM)
SEM Action Steps
- Buy green
- Donate
- Recycle
When purchasing new electronic equipment buy only products that have been
designed with environmentally preferable attributes
Many users of technology devices report aches and pains associated with repeated and long-term usage of the devices, known as
repetitive strain injury (RSI)
impacts your muscles, nerves, tendons, and ligaments and affects the upper parts of the body
repetitive strain injury (RSI)
Repeating the same activity over a lengthy time period
Repetitive activity
Using the wrong procedure or posture
Improper technique
Performing the same high-level activity without frequent periods of rest
Uninterrupted intensity
Being too close to a screen or looking at screens without regular breaks can cause
eyestrain
Is an applied science that specifies the design and arrangement of items that you use so that you and the items interact efficiently and safely
Ergonomics
In addition to technology addiction, there are other behavioral risks associated with using technology, including:
- Sedentary lifestyle. less time for physical activity
- Psychological development. Such as poor self-confidence and anxiety
- Social interaction.
Includes sending, posting, or sharing negative, harmful, mean-spirited, and usually false content about another person. Sharing personal or private information to cause embarrassment or humiliation to that person before others
Cyberbullying
- Seems to never end
- Everyone knows about it
- May follow for a lifetime
Cyberbullying
involves the use of technology to stalk another person through email, text messages, phone calls, and other forms of communication
Cyberstalking
Who should you talk to if you suspect that someone you know may be a victim or if you are yourself?
local law enforcement agencies