Unit 8 Flashcards
Online threats:
1) Cyberbullying.
2) Inappropriate content.
3) Emotional abuse.
4) Data theft.
5) Exploiting others.
6) Catfishing.
7) False comments about others.
eSafety using email:
1) Don’t open unknown emails.
2) Always check the sender of email.
3) Using the browser to go to a website instead of using the link in the mail.
4) Never send payment information via email.
5)Be careful with sending personal information.
Authentication factors:
1) Knowledge factor: Consisting information that the user possesses.
2) Possession factor: Items the user has with them.
3) Inheritance factor: Fingerprints or iris.
Methods that use two-factor authentication:
1) Withdrawing money from ATM.
2) USB devices with authentication codes.
3) Using knowledge factor to bypass.
Identifying phishing email:
1) Urgency: wanting you to respond quickly without thinking.
2) Careless use of language: Spelling mistakes and careless ways of typing.
3) Impersonal: Being referred to as “dear customer” or general phrases.
4) False links: website controlled by criminals.
5) Attachments: may have spyware.
Types of biometric data:
1) Physical: fingerprints, eye retinas, voice, facial patterns etc.
2) Behavioral: Signature, handwriting analysis, voice pattern.
digital certificate consists of:
1) Person’s name.
2) An email address.
3) A serial number.
4) Public key.
5) Expiration date.
6) Digital signature.
Electrical overload:
When too many electrical items are plugged into one socket causing more current to be put across an electrical wire.
International data protection legislation:
Laws to maintain privacy of private data.
Data subject:
The person whose data is being stored.
Personal data:
Data relating to the information about a living individual.
eSafety:
Being safe on the internet.
Malware:
Software designed to get unauthorized access to one’s device.
Social networking sites:
Websites where you can connect with people from your friends and family and all over the world.
Information assets:
Valuable data that you wouldn’t want to be stolen.
Identity theft:
Fraud where personal information is stolen to impersonate the person online
Spam:
Junk mail that involves nearly identical message being sent to multiple people.
Hacking:
Gaining unauthorized access to someone’s device.
Phishing:
A criminal activity trying to find sensitive information such as passwords or banking details with fraud.
Spyware:
Malware designed to be installed secretly on a computer and record private information.