Unit 8 Flashcards

1
Q

Online threats:

A

1) Cyberbullying.
2) Inappropriate content.
3) Emotional abuse.
4) Data theft.
5) Exploiting others.
6) Catfishing.
7) False comments about others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

eSafety using email:

A

1) Don’t open unknown emails.
2) Always check the sender of email.
3) Using the browser to go to a website instead of using the link in the mail.
4) Never send payment information via email.
5)Be careful with sending personal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Authentication factors:

A

1) Knowledge factor: Consisting information that the user possesses.
2) Possession factor: Items the user has with them.
3) Inheritance factor: Fingerprints or iris.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Methods that use two-factor authentication:

A

1) Withdrawing money from ATM.
2) USB devices with authentication codes.
3) Using knowledge factor to bypass.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Identifying phishing email:

A

1) Urgency: wanting you to respond quickly without thinking.
2) Careless use of language: Spelling mistakes and careless ways of typing.
3) Impersonal: Being referred to as “dear customer” or general phrases.
4) False links: website controlled by criminals.
5) Attachments: may have spyware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Types of biometric data:

A

1) Physical: fingerprints, eye retinas, voice, facial patterns etc.
2) Behavioral: Signature, handwriting analysis, voice pattern.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

digital certificate consists of:

A

1) Person’s name.
2) An email address.
3) A serial number.
4) Public key.
5) Expiration date.
6) Digital signature.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Electrical overload:

A

When too many electrical items are plugged into one socket causing more current to be put across an electrical wire.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

International data protection legislation:

A

Laws to maintain privacy of private data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data subject:

A

The person whose data is being stored.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Personal data:

A

Data relating to the information about a living individual.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

eSafety:

A

Being safe on the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Malware:

A

Software designed to get unauthorized access to one’s device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Social networking sites:

A

Websites where you can connect with people from your friends and family and all over the world.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Information assets:

A

Valuable data that you wouldn’t want to be stolen.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Identity theft:

A

Fraud where personal information is stolen to impersonate the person online

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Spam:

A

Junk mail that involves nearly identical message being sent to multiple people.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Hacking:

A

Gaining unauthorized access to someone’s device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Phishing:

A

A criminal activity trying to find sensitive information such as passwords or banking details with fraud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Spyware:

A

Malware designed to be installed secretly on a computer and record private information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Pharming:

A

Malicious program in computer or on server that causes any clicks to take you to another website.

22
Q

Vishing:

A

Using telephone as a means of obtaining a person’s details.

23
Q

Smishing:

A

Uses a device to lure people into going into a website.

24
Q

Credit card fraud:

A

Fraud done using a credit or debit card.

25
Q

Shoulder surfing:

A

Finding login names, passwords and credit card pins visually by standing next to a person.

26
Q

Cloning:

A

Making an exact copy of something.

27
Q

Key logger:

A

A malware that records individual key strokes.

28
Q

Biometrics:

A

Using personal characteristics as a way of identification.

29
Q

Encrypted:

A

Scrambled data that cannot be understood.

30
Q

Encryption:

A

Process of turning into a form that it only can be read by the receiver.

31
Q

Cipher:

A

A method of encrypting data.

32
Q

Key:

A

A piece of information that is used for encrypting and decrypting data.

33
Q

Ciphertext:

A

Encrypted plaintext.

34
Q

Decrypt:

A

Changing the ciphertext back to plain text.

35
Q

Symmetric encryption:

A

Same key used for encryption and decryption.

36
Q

Asymmetric encryption:

A

A method of encryption that used two different keys.

37
Q

Public key:

A

Using a freely available key to encrypt a message.

38
Q

Private key:

A

A key known only to the person who will decrypt the message.

39
Q

Digital certificate:

A

A method of guaranteeing that a website is genuine and the communication between the system and the server is secure.

40
Q

Certificate authorities:

A

A trusted entity that uses digital certificates.

41
Q

Firewall:

A

Software or hardware devices that protect against unauthorized access to a network.

42
Q

Multi-factor authentication:

A

User has to produce several pieces of evidence in a test.

43
Q

Challenge-response check:

A

Authentication method used to identify a user who has to produce a piece of evidence.

44
Q

Credentials:

A

Pieces of information.

45
Q

Knowledge factor:

A

Something a person knows for authentication.

46
Q

Possession factor:

A

Something that a person owns and can be used for authentication.

47
Q

Inheritance factor:

A

A physical characteristic that can be used for authentication.

48
Q

Two factor authentication:

A

User has to produce two pieces of evidence in a test.

49
Q

What are the legal rights of data subjects?

A

(1) Be informed about collection of use.
(2) Access own personal data free of charge.
(3) Have inaccurate data corrected.
(4) Have data deleted after it has met its purpose.
(5) Obtain and reuse own data.
(6) Object to processing of their data.

50
Q

What are the legal responsibilities of data holders?

A

(1) Ensure data is accurate and up to date.
(2) Ensure subjects give consent.
(3) Collect data for specified purpose.
(4) Hold as much data as necessary.
(5) Not to keep data longer than necessary.
(6) Process data in a transparent, fair and lawful way.
(7) Keep data secure.

51
Q

Blank

A

Blank