Unit 7A: Security Flashcards

1
Q

New Personal Assistant Apps

A

guess what you want based off your breadcrumbs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Procedural Errors

A

computer errors that occur when person does not follow procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Software Errors

A

glitches/bugs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

“Dirty Data” Problems

A

incomplete or outdated data input

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Electromechanical Problems

A

faultily constructed or worn out systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Natural Hazards

A

natural disasters & weather extremes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Theft of Hardware

A

Physically Robbing computer parts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Theft of Software

A

pirating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Theft of Intellectual Property

A

companies break into competitor computer system to steal trade secrets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Theft of Time and Services

A

Using employer’s time to play games or whatnot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Internet Related Fraud

A

scams, identity theft, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Crimes of Malice

A

crashing entire systems (e.g., education and health)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Attacks on Infrastructure

A

power grid, oil refineries, etc…

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Security Safeguards

A

1) Deterrents to Computer Crime
2) Identification & Access
3) Encryption
4) Protection of Software Data
5) Disaster-Recovery Plans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

3 Ways of Authenticating Computer User’s Identity

A

1) What you know - security questions, passwords, fingerprint
2) What you have - cards, keys, signatures
3) Who you are - biometrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Threats to Privacy from 3 Giant Sources

A

1) Business & Cybersprying
2) Government & Cyberspying
3) Foreign Governments & Cyberspying

17
Q

Evil Twin Attack

A

hacking through Wi-Fi hotspot

18
Q

What sites should you trust?

A

Those with encryption tech

19
Q

Pharming

A

directing victims to websites to steal their info