Security and Social Implications Flashcards

1
Q

What is a firewall?

A

A security system that monitors and controls incoming/outgoing network traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is phishing?

A

Fraudulent attempts to obtain sensitive information by pretending to be a trustworthy entity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Write down a definition for ‘Shoulder Surfing’.

A

The attacker uses observational techniques such as looking over someone’s shoulder, to get information while the user is inputting sensitive data like a password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is spoofing?

A

Spoofing is when someone disguises an email address, sender name, phone number, or website URL—often just by changing one letter, symbol, or number—to convince you that you are interacting with a trusted source.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is ransomware?

A

Malware that encrypts data and demands payment to restore access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is spyware?

A

Spyware is malicious software that enters a user’s computer, gathers data from the device and user, and sends it to third parties without their consent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Write down a definition for Social Engineering.

A

the act of manipulating/tricking people into divulging confidential information to commit computer fraud or gain unauthorised access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is an AUP?

A

Acceptable User Policy
- a document stipulating constraints and practices that a user must agree to for access to or use of a corporate network, the internet or other computing resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define GIGO

A

Garbage In, Garbage Out
- If invalid data is entered in a program, the output will also be invalid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

List types of data validation measures

A

Presence
Range
Uniqueness
Length
Type
Format
Logicial
Check Digit
Check Sum
Data transmission check

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is RFID?

A

RFID (Radio Frequency Identification) is a technology that uses electromagnetic fields to identify and track objects via embedded tags.

RFID systems are vulnerable to unauthorized scanning, cloning of tags, data interception, and tracking without consent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly