unit 8 - cybersecurity Flashcards

1
Q

personally identifiable information (PII)

A

information about an individual that identifies, links, relates, or
describes them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what can be used to create knowledge about an individual

A
  • geolocation, cookies, browsing history
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

most digital technology needs some kind of PII to work

A

ex: street navigation needs to know your location or PII stored online to simplify making online purchases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

once data is made digital, especially once its shared online, its easier or harder to control?

A

much harder to control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

how does our private data power computing innnovations positively

A
  • it makes products that are convenient, interesting, personal, useful, and often “free” because we “pay” with our data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

legal and ethical concerns are raised by:

A
  • computing innovations that harm people
  • computing innovations that play a role in social and political issues
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

privacy policies

A
  • they protect companies legally but are often ignored by users due to complex language
  • they are required even for small businesses to disclose data usage
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

privacy policies: “control”

A
  • data settings????/
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

privacy policies: “not”

A
  • limitations on data usage??
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

privacy policies: “such as”

A
  • signals vague data practices
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what are ways to enhance privacy

A
  • check the last updated date
  • use burner emails
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what are burner emails?

A

An email account set up to temporarily receive messages and attachments when people do not want to divulge their primary email address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

facial recognition technology

A
  • used in apps, surveillance, security
  • nearly half of US adults are in databases
  • works by mapping facial landmarks to create “faceprints”
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what are concerns and uses of facial recognition technology

A
  • gov use it for security (airports)
  • companies track customers emotions and purchasing behaviors
  • raises ethical concerns about privacy, surveillance, and data commercialization
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

supreme court ruling on cell phone data

A
  • limited warrantless access to historical cell phone data
  • challenges the third-party doctrine (previously, shared data wasn’t protected under the Fourth Amendment).
  • case brought by Timothy Carpenter (linked to robberies using cell data without a warrant).
  • tech companies pushed for stronger digital privacy protections.
  • impacts digital privacy rights as surveillance increases.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

phishing

A

a technique that attempts to trick a user into providing personal information. that personal information can then be used to access sensitive online resources, such as bank accounts and emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

keylogging

A

the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

malware

A

software intended to damage a computing system or to take partial control over its operation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

rogue access point

A

a wireless access point that gives unauthorized access to secure networks

20
Q

encryption

A

a process of encoding messages to keep them secret, so only “authorized” parties can read it

21
Q

decryption

A

a process that reverses encryption, taking a secret message and reproducing the original plain text

22
Q

cipher

A

the generic term for a technique (or algorithm) that performs encryption

23
Q

caesar’s cipher

A

a technique for encryption that shifts the alphabet by some number of characters

24
Q

cracking encryption

A

when you attempt to decode a secret message without knowing all the specifics of the cipher, you are trying to crack the encryption

25
Q

symmetric key encryption

A

involves one key for both encryption and decryption

26
Q

public key encryption

A

pairs a public key for encryption and a private key for decryption

  • the sender does not need the receiver’s private key to encrypt a message, but the receiver’s private key is required to decrypt the message
27
Q

what can you do to protect your data

A

use multifactor authentication

28
Q

how can attackers get info for two factor authentication

A
  • fake logic pages
  • compromised devices
  • intercepting authentication messages
29
Q

ways in which hacking occurs

A
  • sim swapping
  • phishing and MITM attacks
  • malware and keyloggers
  • session hijacking
30
Q

ways to improve security

A
  • use hardware security keys instead of SMS
  • enable biometric authentication when possible
  • use app based authenticators
  • be cautious with push notifications and monitor login attempts
  • strong unique passwords
31
Q

how can you protect your device from computer viruses

A

virus scanning software & updating system software

32
Q

multifactor authentication

A

a method of computer aceess in which a user has to successfully provide evidence in at least two of the following categories: knowledge, possesion, and inheritance. each layer provides a new layer of security

33
Q

computer virus scanning software

A

protects a computing system against infection

34
Q

how can u tell the URL is sus

A
  • doesn’t have a top level domain (.net, .org. .com”
  • honest if the company name is in the middle kinda (accounts.paypal.com)
35
Q

access points

A
  • connect to the internet via a wired connection but share it wirelessly with many devices like your computer
  • most routers include access points
36
Q

routers

A
  • contain access points
  • not responsible for providing wireless internet access
37
Q

malware

A
  • “malicious software” that is unknowingly installed onto a computer; often tries to steal data or make money off of the user
38
Q

malware: trojan horse

A

harmful program that poses as a legit program

39
Q

malware: virus

A
  • self replicating: contains code that copies itself into other files on the system
40
Q

malware: worm

A
  • self replicating but it copies itself into entirely different computers within the network
41
Q

firewall

A

a system that monitors incoming and outgoing network traffic to a computer or internal network and determines what traffic to allow; these cannot identify and block all malware, but they are a useful line of defense for what they can identify

42
Q

antivirus software

A
  • protects an individual computer by constantly scanning files and identifying malware
  • once it finds malware, guides the users to deleting or repairing
43
Q

what allows people to share private information over open networks

A

encryption!

44
Q

websites often use cookies…

A

to track user actions on their site and even acrosss other sites