Cybersecurity Chapter 6 Review Flashcards
12 Questions
101 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is War Driving?

  • Accessing someone else's unsecured Wi-Fi network without authorization.
  • Set up to look like a legitimate site.
  • Intercepting a message electronically.
  • Involves driving in a car with a portable computer looking for unsecured Wi-Fi networks to connect to. (correct)
  • What does Wi-Fi Piggybacking mean?

  • The theft of data or information.
  • Accessing someone else's unsecured Wi-Fi network without authorization. (correct)
  • Recording or observing the actions of employees.
  • Intercepting a message electronically.
  • What is the definition of Data Theft?

  • The use of video cameras for security.
  • The complete malfunction of a computer system.
  • The theft of data or information located on or being sent from a computer. (correct)
  • Malicious software.
  • What is a Spoofed Website?

    <p>A site set up to look like a legitimate site.</p> Signup and view all the answers

    What does the term Trojan Horse refer to?

    <p>A type of malware that masquerades as something else.</p> Signup and view all the answers

    What is malware?

    <p>Malicious software.</p> Signup and view all the answers

    What does phishing aim to achieve?

    <p>To trick the recipient into revealing sensitive personal information.</p> Signup and view all the answers

    What is the purpose of the Security Software?

    <p>To provide protection against various threats, including viruses and malware.</p> Signup and view all the answers

    What is an example of a Denial of Service (DoS) attack?

    <p>Flooding a network server with requests.</p> Signup and view all the answers

    What does identity theft involve?

    <p>Stealing someone's information to impersonate them.</p> Signup and view all the answers

    How can hardware loss occur?

    <p>When a device is stolen or lost by the owner.</p> Signup and view all the answers

    Match the following terms with their definitions:

    <p>Botnets = A group of bots controlled by one individual. Spam = Unsolicited email sent to a large group. Electronic Profiling = Collecting in-depth information about an individual. Computer Worm = A malicious program designed to replicate itself and spread damage.</p> Signup and view all the answers

    Study Notes

    Cyber Security Terms and Definitions

    • War Driving: Involves searching for unsecured Wi-Fi networks while driving with a portable computer; a method often used to exploit open networks.

    • WiFi Piggybacking: Unauthorized access to someone else's unsecured Wi-Fi network, allowing users to utilize internet services without consent.

    • Criminal Intercepting: The act of electronically intercepting messages, potentially compromising data confidentiality.

    • Spoofed Website: A fraudulent site designed to mimic a legitimate website, often used for phishing or data theft.

    • Data Theft: Involves stealing data or information that is stored on a computer or transmitted between devices.

    • Dot Cons: Refers to online crimes involving theft, fraud, or scams aimed at stealing money or resources from individuals or businesses.

    • Spam: Unsolicited bulk email sent to large groups, often for advertising or phishing purposes.

    • System Failure: The complete malfunction of a computer system, leading to an inability to perform tasks or access data.

    • Antivirus Software: A security tool designed to detect, prevent, and eliminate computer viruses and various types of malware.

    • Employee Monitoring: The practice of recording or observing employee actions in the workplace to ensure productivity and compliance.

    • Video Surveillance: Use of video cameras to observe and record individual activities for security purposes, often in public or sensitive areas.

    • Security Software: A collection of tools that provide security features, including firewalls and protection against malware and online fraud.

    • Trojan Horse: A form of malware that disguises itself as a legitimate application, tricking users into installing it.

    • Pharming: A scam that misdirects users from legitimate websites to spoofed ones via altered domain names.

    • Denial of Service (DoS) Attack: An attempt to disrupt a service by overwhelming it with excessive requests, rendering it unavailable for legitimate users.

    • Spear Phishing: Targeted phishing attempts that are personalized to increase the chance of user response.

    • Electronic Profiling: The process of gathering extensive information about an individual, often for marketing or surveillance purposes.

    • Phishing: A deceptive email tactic that appears to come from a legitimate source, aimed at extracting sensitive data from recipients.

    • Hardware Loss: The risk of losing or having stolen physical devices, such as computers and USB drives, which may lead to data breaches.

    • Botnets: Networks of infected devices (bots) controlled by a single entity, often used to execute large-scale attacks or tasks.

    • Malware: A broad term for malicious software designed to harm, exploit, or otherwise compromise computers and networks.

    • Marketing Database: A compilation of marketing-related demographic data about individuals, including purchasing habits and geographic locations.

    • Identity Theft: Occurs when someone illegally obtains enough personal information to impersonate another individual, often for financial gain.

    • Virus: A malicious software program that self-replicates and spreads without user consent, altering system operations.

    • Information Privacy: The rights of individuals and organizations to oversee the collection and use of their personal information.

    • Computer Worm: A type of malware that spreads independently across networks by copying itself, often causing damage to systems.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Test your knowledge on essential cybersecurity terms with these flashcards from Chapter 6. Each card provides a definition for terms related to network security threats and practices, helping you to better understand the concepts of war driving, wifi piggybacking, and more.

    More Like This

    Test Your Knowledge of Cybersecurity Terms
    6 questions
    Cybersecurity Key Terms Quiz
    12 questions

    Cybersecurity Key Terms Quiz

    ConvenientSasquatch avatar
    ConvenientSasquatch
    Cyber Security Term 2 Quiz
    19 questions
    Use Quizgecko on...
    Browser
    Browser