Sface Internet Use Flashcards

1
Q

What’s a computer virus

A

Any program that infects a user’s computer and acts in a way that will harm users without their knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What do viruses attack

A

They do not attack the hard way, but rather the software that manages and controls the hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How do viruses spread

A

Infected attachments sent with email messages

Infected files downloaded from the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cybercrime

A

It’s a criminal activity that either targets or uses a computer, a computer network, or a networked device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How to know if there is a virus on my computer

A

Unusually slow computer performance. A sudden change of processing speed could signal that your computer has a virus.

Unusual activities like password changes, this could prevent you from logging into your computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How to prevent your computer from being affected by viruses

A

To make use of anti-virus software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an anti-virus software

A

Is software that scans computer files for viruses and tries to eliminate them. It detects the virus by scanning the computer file and comparing it to its database of virus definitions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a virus definition or signature

A

Is the pattern that uniquely identifies a virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What can an anti virus program be configured to

A

Warn you of the presence of a virus or any suspicious activity on your computer

Automatically delete any virus it detects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Examples of anti-virus software

A

Norton AntiVirus
AVG

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How to play a part in preventing viruses

A

Not running programs obtained from untrusted sources

Scanning email attachments and downloaded files before opening them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How do viruses typically spread through flash drives?

A

Viruses spread by being copied onto a flash drive from an infected computer. When you use that flash drive on another computer, the virus can infect the new computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the auto-run feature on flash drives, and how does it work?

A

The auto-run feature makes certain programs or files on a flash drive run automatically when you plug it into a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why is the auto-run feature considered a security risk?

A

Auto-run is risky because it can automatically start viruses on your computer without you knowing, which can quickly spread the infection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How can disabling the auto-run feature help prevent the spread of viruses?

A

Disabling auto-run stops programs from starting automatically when you plug in a flash drive. This gives you a chance to check the drive for viruses before opening any files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a computer worm

A

A computer worm is a type of malware that spreads copies of itself from computer to computer. A worm can replicate itself without any human interaction and does not need to attach itself to a software program in order to cause damage.

17
Q

Trojan horse

A

A Trojan Horse is a program that looks useful or fun but has hidden harmful functions. When run, it can delete files or steal personal information.

Unlike viruses and worms, Trojans don’t spread on their own; they need you to activate them.

To stay safe, don’t open attachments or run programs unless you trust them.

18
Q

Malware

A

Is the collective name for a number of malicious software variants, including viruses, ransomware and spyware

19
Q

How to deal with spam

A

Never respond to spam

Check is your ISP can help. Many service providers filter out as much of the spam as possible

20
Q

How to protect yourself from hoaxes and scams

A

Never accept information at face value. Always question what you read on the internet or in a message.

There are many sites on the Internet that investigate hoaxes and publish their results. You can visit these sites to check the validity of the message.

21
Q

Pharming

A

Pharming is a type of attack where users are redirected from a legitimate website, like their bank’s site, to a fake site that looks real. This trick is used to steal personal information or login details.

22
Q

Ransomware

A

Type of malicious software that infects a computer and restricts users access to it until a ransom is paid to unlock it

23
Q

Phishing

A

Refers to attempts by criminals to con users into giving out personal confidential details such as pin numbers and passwords by pretending to be from a legitimate organization

24
Q

Prevention tips for phishing

A

Do not respond to requests by email or SMS to confirm details such as bank account numbers and especially pins and passwords

Type in the URL of the bank or
e- commerce website directly in the address bar of your browser and do not click on a link in an email to go to these sites

25
Q

What is SMiShing

A

Is when the phishing attack is done via an SMS on a smartphone.

26
Q

Spyware

A

Is unwanted software that infiltrates your computing device, stealing your Internet usage data and sensitive information.

27
Q

Adware

A

Is software that displays unwanted advertisements on your computer

28
Q

What can adware do

A

Serve you pop-up ads
Change your browser’s homepage
Add spyware
Bombard your device with advertisements

29
Q

HTTP

A

Hypertext Transfer Protocol

Allows for the communication between different systems

Most commonly used to transfer data from a web server to a browser in order to allow users to view web pages

30
Q

HTTPS

A

Hypertext Transfer Protocol Secure

HTTPS is a secure version of HTTP.
It encrypts the data exchanged between your browser and a website to keep it private and safe from hackers.

31
Q

What is email spoofing?

A

Email spoofing is the forgery of an email header so that the message appears to have originated from someone or somewhere other than the actual source.

32
Q

Why is email spoofing used in phishing and spam campaigns?

A

Email spoofing is used because people are more likely to open an email when they think it has been sent by a legitimate source.

33
Q

Signs of spoofing

A

Sender email address is similar to the original

Poor grammar is used in the messages

The URL address doesn’t have the “s” in the https://

You receive calls from unknown numbers

Attachments in emails seem suspicious

34
Q

Password policies

A

Don’t use personal information, such as your cell phone number, as a password.

  • Use passwords with at least 8 characters.
  • Create passwords with a mixture of letters (both upper and lower case), numbers, and special symbols.
  • Use different passwords for different accounts.
  • Change your passwords regularly.
  • Don’t write down your passwords; remember them instead.
  • Never share your passwords with anyone.
35
Q

Identity theft

A

Term used to refer to all types of crime in which someone wrongfully obtains and uses another person’s personal data in some way that involves fraud or deception, typically for economic gain.

36
Q

Data theft

A

Data theft is when someone illegally obtains and uses someone else’s confidential information without permission.

37
Q

How can data be stealed

A

Password cracking: Intruders can access your device and steal valuable data if it lacks password protection or if the password can be easily decoded

Eavesdropping: Data transmitted over insecure connections can be intercepted and recorded. Without encryption, there is a high risk of losing passwords and other private information to eavesdroppers.

38
Q

Copyright

A

The lawful right of an author, artist, composer or other creator to control the use of his or her work by others

39
Q

Fair use

A

The right to use copyrighted work under certain conditions without permission of the copyright owner