Security and Safety Flashcards

1
Q

Hazards to our physical bodies include

A

Eye strain from viewing the computer screen in poor light, poor posture when using devices, or muscle fatigue that comes from typing on a keyboard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A common term used to describe individuals who launch attacks against other users and their computers is

A

Attackers or threat actor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Attackers in organized gangs meet in

A

hidden online “dark web” forums

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

When organized gangs of young attackers meet online they

A

Trade information, buy and sell stolen data and attacker tools, and even coordinate their attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Are individuals who want to attack computers, but lack the knowledge of computers and networks needed to do so.

A

Script kiddies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Work by downloading freely available automated attack software (scripts) from websites and using it to perform malicious acts

A

Script kiddies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Are attackers who are strongly motivated by principles or beliefs.

A

Hactivists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Can involve breaking into a website and changing the contents on the site as a means of making a political statement.

A

Attacks by hactivists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Attack a nation’s computer networks, like the electrical power grid, to cause disruption and panic among citizens.

A

Cyberterrorists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Instead of using an army to strike at an adversary, governments are now employing state-sponsored attackers to launch computer attacks against their enemies through

A

Nation state actors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Another serious security threat to companies can come from its own employees, contractors, and business partners, called

A

Insiders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A healthcare worker upset about being passed over for a promotion might illegally gather health records on celebrities and sell them to the media. This is an example for a/n

A

Insiders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The greatest risk comes from attackers who want to steal information for

A

their own financial gain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Once, the reason for launching computer attacks was for the attackers to

A

show off their technology skills (fame)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Where do you face risks when using the internet or email

A

Online banking
E-commerce shopping
Fake websites
Social media sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Attackers try to steal your password to access your online bank account and transfer your money overseas.

A

Online banking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Rrisks you face online when using the internet or email

A

Online banking
E-commerce shopping
Fake websites
Social media sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

When you enter your credit card number to make an online purchase an attacker can try to intercept your card number as it is transmitted over the network

A

E-commerce shopping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Attackers can set up an “imposter” website that looks just like the site where you pay your monthly credit card bill.

A

Fake websites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Attackers can ask to be a “friend” on your social media site by pretending to be someone you met or went to school with. Once you accept this new friend the attacker may be able to see personal information about you, such as your pet’s name or your favorite vacation spot. This information could be used to reset your password on another website that requires the answer to the security questions

A

Social media sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Gathering your personal information is not something that is done only by attackers it can be done and used by

A

Organizations such as schools and hospitals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Sell your information to a drug company who sends you information about their drugs

A

Invalid use by hospitals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Refers your past procedures when you are admitted as a patient

A

Valid use by hospitals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The process of sorting through extremely large sets of data to uncover patterns and establish relationships

A

Data mining which many organizations use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Most data mining tools allow organizations to

A

predict future trends

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q
  • Give only necessary information when completing an online form or a warranty.
  • Review the information that online sites such as Google have stored about you.
  • Request to be removed from mailing lists.
  • Create another email account to use when a merchant or website requires an address.
  • Do not use your social media account login information to log in to another site.
A

Tips for protecting personal information that is gathered by legitimate organizations include

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Eelectronic waste

A

e-waste

Americans generate over 9.4 million tons of e-waste each year

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Contaminate the ground and water supply, causing harm to the environment

A

Toxic metals, such as lead and mercury

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Promotes the reduction of e-waste

A

Sustainable Electronics Management (SEM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

SEM Action Steps

A
  1. Buy green
  2. Donate
  3. Recycle
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

When purchasing new electronic equipment buy only products that have been

A

designed with environmentally preferable attributes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Many users of technology devices report aches and pains associated with repeated and long-term usage of the devices, known as

A

repetitive strain injury (RSI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

impacts your muscles, nerves, tendons, and ligaments and affects the upper parts of the body

A

repetitive strain injury (RSI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Repeating the same activity over a lengthy time period

A

Repetitive activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Using the wrong procedure or posture

A

Improper technique

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Performing the same high-level activity without frequent periods of rest

A

Uninterrupted intensity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Being too close to a screen or looking at screens without regular breaks can cause

A

eyestrain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Is an applied science that specifies the design and arrangement of items that you use so that you and the items interact efficiently and safely

A

Ergonomics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

In addition to technology addiction, there are other behavioral risks associated with using technology, including:

A
  1. Sedentary lifestyle. less time for physical activity
  2. Psychological development. Such as poor self-confidence and anxiety
  3. Social interaction.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Includes sending, posting, or sharing negative, harmful, mean-spirited, and usually false content about another person. Sharing personal or private information to cause embarrassment or humiliation to that person before others

A

Cyberbullying

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q
  • Seems to never end
  • Everyone knows about it
  • May follow for a lifetime
A

Cyberbullying

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

involves the use of technology to stalk another person through email, text messages, phone calls, and other forms of communication

A

Cyberstalking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Who should you talk to if you suspect that someone you know may be a victim or if you are yourself?

A

local law enforcement agencies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

programs that are created by attackers to infiltrate the victims’ computers without their knowledge

A

malicious softwares

45
Q

What tools attackers use to attack computers and networks?

A
  1. Malicious softwares
  2. Tricking users (to preform a compromising action or providing sensitive information)
46
Q

software can intercept data, steal information, launch other attacks, or even damage the computer so that it no longer properly functions

A

malicious software

47
Q

A low-cost but highly effective approach for the attackers

A

defeating security through a person instead of technology

48
Q

Is malicious software that can delete or corrupt files and gather personal information

A

Malware

49
Q

Refers to a wide variety of software programs that attackers use to enter a computer system without the user’s knowledge or consent and then perform an unwanted and harmful action

A

Malware

50
Q

Is malicious computer code that, like its biological counterpart, reproduces itself on the same computer. Almost all of them “infect” by inserting themselves into a computer file.

A

A computer virus (when the file is opened, the virus is activated)

51
Q

Is a malicious program that uses a computer network to replicate

A

Worms (sometimes called network viruses)

52
Q

Enters a computer through the network and then takes advantage of a vulnerability on the host computer. Once it has exploited that vulnerability on one system, it immediately searches for another computer on the network that has the same vulnerability.

A

Worms (sometimes called network viruses)

53
Q

Is malware that hides inside another program, often one downloaded from the web. It “masquerades” as performing a safe activity but also does something malicious

A

A computer Trojan

54
Q

A user might download what is advertised as a calendar program, yet when it is installed, it also installs malware that scans the system for credit card numbers and passwords, connects through the network to a remote system, and then transmits that information to the attacker. This example is for

A

A computer Trojan

55
Q

One of the fastest-growing types of malware is

A

ransomware

56
Q

Prevents a user’s device from properly and fully functioning until a fee is paid. It embeds itself onto the computer in such a way that it cannot be bypassed, even by rebooting.

A

Ransomware

57
Q

Early ransomware, called

A

blocker ransomware

58
Q

prevented the user from accessing the computer’s resources and displayed a special screen pretending to be from a reputable third-party, such as law enforcement.

A

blocker ransomware

59
Q

Instead of just blocking the user from accessing the computer, it encrypts all the files on the device so that none of them can be opened

A

Today’s ransomware

60
Q

An attack that changes the device’s address is called

A

address spoofing

61
Q

is a category of attacks that attempts to trick the victim into giving valuable information to the attacker. At its core, it relies on an attacker’s clever manipulation of human nature in order to persuade the victim to provide information or take actions. Several basic principles of psychology make it highly effective.

A

Social engineering

62
Q

Social Engineering Principles

A
  • Authority
  • Intimidation
  • Consensus / Influenced by what others do
  • Scarcity
  • Urgency
  • Familiarity
  • Trust
63
Q

Is sending an email or displaying a web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into giving private information.

A

Phishing

64
Q

Is a false warning, often contained in an email message that pretends to come from a valid source like the company’s IT department. Attackers can use it as a first step in an attack

A

A hoax

65
Q

says that there is a “deadly virus” circulating through the Internet and that you should erase specific files or change security configurations, and then forward the message to other users.

A

A hoax

66
Q

Is unwanted email messages sent from an unknown sender to many email accounts, usually advertising a product or service such as low-cost medication, low-interest loans, or free credit reports.

A

Spam

67
Q

Can be used to distribute malware. It is sent with attachments that contain malware.

A

Spam

68
Q

over ….. percent of data breaches start by a phishing attack, and …. percent of employees have clicked at least one phishing link in the last year.

A

93% - 22%

69
Q

Total loss of power

A

Blackout

70
Q

Drop in voltage lasting minutes or hours

A

Brownout

71
Q

Very short duration of voltage increase

A

Spike

72
Q

Short duration of voltage increase

A

Surge

73
Q

Unwanted high frequency energy

A

Noise

74
Q

can defend computer equipment from spikes, surges, and noise

A

A surge protector

75
Q

they cannot provide power in the event of a blackout or brownout

A

A surge protector

76
Q

Like a surge protector, but is positioned between the computer and electrical outlet; however, it contains a battery that maintains power to the equipment for a short time in case of an interruption in the primary electrical power source.

A

an uninterruptible power supply (UPS)

77
Q

To prevent laptops from being stolen you can use

A

a cable lock

78
Q

One of the tips to reduce the risk of theft or loss:

A

If a theft does occur, do not resist or chase the thief. Instead, take note of the suspect’s description, including any identifying characteristics and clothing, and then call the authorities. Also contact the wireless carrier and change all passwords for accounts accessed on the device.

79
Q

may indicate that it is connected to an expensive device

A

White or red headphone cords

consider changing the cord to a less conspicuous color.

80
Q

Security Features for Recovery of a Stolen Device

A
  1. Alarm
  2. Last known location
  3. Locate
  4. Remot lockout
  5. Theift picture
81
Q

If a lost or stolen device cannot be recovered, it might be necessary to perform

A

remote wiping

82
Q

erases sensitive data stored on the mobile device

A

remote wiping

83
Q

copying files from a computer’s hard drive that are then stored in a remote location

A

Creating a data backup

84
Q

can protect against hardware malfunctions, user error, software corruption, and natural disasters. They can also protect against cyberattacks because they can restore infected computers to their properly functioning state.

A

data backup

85
Q

What online service can you use for beckup if only a slow Internet connection is available?

A

You perform your own backup from the hard drive to another medium and then store that medium in a remote location ( or use modern operating such as Aoemi Backupper, Acronis True Image, and EaseUS)

86
Q

is a wireless data network technology that provides high-speed data connections for mobile devices.

A

Wi-Fi

87
Q

is the process of “scrambling” information in such a way that it cannot be read unless the user possesses the “key” to unlock it back to a readable format

A

Encryption

88
Q

unlocking encryption is called

A

Decryption

89
Q

Provides an extra level of protection: if an attacker were somehow able to get to the information he/she could not read the information because she would not have the key to unlock it.

A

Encryption

90
Q

can be applied to data on your hard drive (data-at-rest) just as it can be used to protect data being transmitted across the Internet (data-in-transit).

A

encryption

91
Q

is a technology used to verify a user’s identity and key that has been “signed” by a trusted third party.

A

A digital certificate

92
Q

make it possible to verify the identity of a user and the user’s key to prevent an attack from someone impersonating the user

A

A digital certificate

93
Q

involves using someone’s personal information, such as their name, Social Security number, or credit card number, to commit financial fraud.

A

Identity theft

94
Q
  • Establish phone or wireless service in the victim’s name.
  • File for bankruptcy under the person’s name to avoid eviction.
  • Go on spending sprees using fraudulently obtained credit and debit card account numbers.
A

some of the actions that can be undertaken by identity thieves

95
Q

Discarded credit card statements, charge receipts, and bank statements can be retrieved after being discarded in the trash for personal information.

A

Dumpster diving technique

96
Q

Attackers convince victims to enter their personal information at an imposter website after receiving a fictitious email from a bank.

A

Phishing technique

97
Q

Using a standard change-of-address form the attackers divert all mail to their post office box so that the victim never sees any charges made.

A

Change of address form technique

98
Q

An attacker who pretends to be from a legitimate research firm asks for personal information.

A

Pretexting technique

99
Q

Stolen wallets and purses contain personal information that can be used in identity theft.

A

Stealing technique

100
Q

First step to avoid theft is to

A

deter thieves by safeguarding information (shred financial doc, etc.)

101
Q

To avoid thefts, **do not **carry a Social Security number in

A

a wallet or write it on a check

102
Q

Second step to avoid theft is to

A

monitor financial statements and accounts (be alert, review statments)

103
Q

U.S. users monitor and protect their financial information that is stored by a credit reporting agency

A

by requesting one free credit report annually and to have a credit “freeze” (as well as a “thaw”)

104
Q

might allow your computer to download a “script” or series of instructions that commands the browser to perform specific actions.

A

an add-on

An attacker use the add-on to download and execute malware on the user’s

105
Q

is a file created by a website that stores information on your computer, such as your website preferences or the contents of an electronic shopping cart.

A

Cookie

106
Q

Some can be stolen and used to impersonate you, while others can be used to track your browsing or buying habits.

A

Cookie

107
Q

Some of the important security settings include

A
  1. Cookie
  2. Scripting
  3. Plug-ins
  4. Pop-ups
  5. Clear browsing data
  6. Plug-in validation
108
Q

General defenses that you can use for any social-networking site

A

Be cautious about:
1. What information you post
2. Who can view your information
3. New or updated security settings

109
Q

Dynamic content such as animated images or customized information, can be done through web browser additions called

these web browser additions introduce a new means for attackers

A

extensions, plug-ins, and add-ons