Podcast
Questions and Answers
What is one of the purposes cookies serve on websites?
What is one of the purposes cookies serve on websites?
- Store user names or passwords (correct)
- Limit website traffic
- Display ads only
- Increase loading speed
Phishing scams utilize official-looking messages to gather personal information.
Phishing scams utilize official-looking messages to gather personal information.
True (A)
What is the main function of spyware?
What is the main function of spyware?
To collect information about the user without their knowledge.
______ is defined as gaining unauthorized access by taking advantage of human trust.
______ is defined as gaining unauthorized access by taking advantage of human trust.
Match the following terms with their definitions:
Match the following terms with their definitions:
What is a botnet?
What is a botnet?
A worm is a type of program that does not replicate itself.
A worm is a type of program that does not replicate itself.
What is a cybercrime?
What is a cybercrime?
What do access controls define?
What do access controls define?
Which of the following is a method of biometric authentication?
Which of the following is a method of biometric authentication?
Malware always requires user knowledge and permission to operate.
Malware always requires user knowledge and permission to operate.
A device that authenticates identity using personal characteristics is called a __________.
A device that authenticates identity using personal characteristics is called a __________.
Digital forensics is primarily used for personal data recovery.
Digital forensics is primarily used for personal data recovery.
Name one type of malware that collects user information secretly.
Name one type of malware that collects user information secretly.
What is the purpose of encryption?
What is the purpose of encryption?
Which of the following is NOT a method of authentication?
Which of the following is NOT a method of authentication?
A __________ is a program that blocks access to a device until a payment is made.
A __________ is a program that blocks access to a device until a payment is made.
A __________ verification system uses two different methods to confirm a user's identity.
A __________ verification system uses two different methods to confirm a user's identity.
Match the types of malware with their descriptions:
Match the types of malware with their descriptions:
A Distributed DoS attack uses multiple compromised devices to overwhelm a target.
A Distributed DoS attack uses multiple compromised devices to overwhelm a target.
Which of the following is NOT a type of malware?
Which of the following is NOT a type of malware?
Match the following biometric systems to their descriptions:
Match the following biometric systems to their descriptions:
What is the purpose of an audit trail in access controls?
What is the purpose of an audit trail in access controls?
Internet-transmitted information carries a lower security risk compared to information stored on premises.
Internet-transmitted information carries a lower security risk compared to information stored on premises.
Which area does NOT typically use digital forensics?
Which area does NOT typically use digital forensics?
In computer security, what does the term 'malware' refer to?
In computer security, what does the term 'malware' refer to?
A cookie is used to store large amounts of personal data on a web server.
A cookie is used to store large amounts of personal data on a web server.
What is information privacy?
What is information privacy?
Flashcards
Digital Security Risk
Digital Security Risk
Any event or action that could cause a loss of or damage to a computer or mobile device hardware, software, data, information, or processing capability.
Cybercrime
Cybercrime
An online or Internet-based illegal act.
Malware
Malware
Programs that act without a user's knowledge and deliberately alter the operations of computers and mobile devices.
Adware
Adware
Signup and view all the flashcards
Ransomware
Ransomware
Signup and view all the flashcards
Rootkit
Rootkit
Signup and view all the flashcards
Spyware
Spyware
Signup and view all the flashcards
Trojan horse
Trojan horse
Signup and view all the flashcards
Botnet
Botnet
Signup and view all the flashcards
Zombie
Zombie
Signup and view all the flashcards
Denial of Service (DoS) Attack
Denial of Service (DoS) Attack
Signup and view all the flashcards
Distributed Denial of Service (DDoS) Attack
Distributed Denial of Service (DDoS) Attack
Signup and view all the flashcards
Backdoor
Backdoor
Signup and view all the flashcards
Spoofing
Spoofing
Signup and view all the flashcards
Firewall
Firewall
Signup and view all the flashcards
Passphrase
Passphrase
Signup and view all the flashcards
Fingerprint reader
Fingerprint reader
Signup and view all the flashcards
Face recognition system
Face recognition system
Signup and view all the flashcards
Hand geometry system
Hand geometry system
Signup and view all the flashcards
Iris recognition system
Iris recognition system
Signup and view all the flashcards
Signature verification system
Signature verification system
Signup and view all the flashcards
Voice verification system
Voice verification system
Signup and view all the flashcards
Two-step verification
Two-step verification
Signup and view all the flashcards
Digital forensics
Digital forensics
Signup and view all the flashcards
What is phishing?
What is phishing?
Signup and view all the flashcards
What is clickjacking?
What is clickjacking?
Signup and view all the flashcards
What is spyware?
What is spyware?
Signup and view all the flashcards
What is adware?
What is adware?
Signup and view all the flashcards
What is social engineering?
What is social engineering?
Signup and view all the flashcards
Study Notes
Digital Security Risks
- A digital security risk is any event or action that could harm computer or mobile device hardware, software, data, information, or processing capabilities.
- Computer crime is any illegal act involving computers or related devices.
- Cybercrime is an online or internet-based illegal act.
Internet and Network Attacks
- Information transmitted over networks carries a higher security risk than information stored on premises.
- Malware is malicious software that operates without user knowledge and alters computer/mobile device operation.
Common Malware Types
- Adware: Displays online ads on webpages, emails, or other internet services.
- Ransomware: Blocks or limits access to computers, phones, or files until a payment is made.
- Rootkit: Hides in a device and allows remote control.
- Spyware: Secretly collects user information and sends it to an outside source.
- Trojan horse: Appears legitimate but contains malicious code. Does not replicate itself.
- Virus: Damages a computer or device by negatively altering operations without permission.
- Worm: Replicates itself repeatedly, consuming resources and potentially shutting down systems.
Internet and Network Attacks (Continued):
- A botnet is a group of compromised computers/devices in a network.
- A zombie is a compromised computer/device.
- A Denial of Service (DoS) attack disrupts computer access to internet services. A Distributed DoS (DDoS) attack is a coordinated DoS.
- A backdoor is a program that bypasses security controls.
- Spoofing disguises a network/internet transmission to appear legitimate.
Internet and Network Attacks (Continued):
- A firewall is hardware or software that protects a network from intrusion.
Unauthorized Access and Use
- Access controls determine who can access a system, when, and what actions are allowed.
- A system should maintain an audit trail documenting successful and failed access attempts.
- Examples of access controls include: username, password.
Unauthorized Access and Use (Continued)
- A passphrase is a private combination of words, often containing mixed capitalization and punctuation. Used with usernames for access.
- A PIN (personal identification number), sometimes called a passcode, is a numeric password. Assigned by companies or users.
- A possessed object (e.g., token) is required for access to the system.
- Biometric devices use physical or behavioral characteristics to verify identity.
Unauthorized Access and Use (Continued):
- Fingerprint readers, face recognition systems, hand geometry systems, iris recognition systems, and signature/voice verification systems are examples of biometric verification methods.
- Two-step verification uses two separate methods for user identity verification.
Unauthorized Access and Use (Continued):
- Digital forensics is the discovery, collection, and analysis of evidence found on computers and networks.
- Digital forensics is used in many fields, such as law enforcement, criminal prosecutions, military intelligence, insurance, and information security.
Information Theft
- Information theft occurs when someone steals personal or confidential information.
- Encryption converts readable data into encoded characters, preventing unauthorized access.
Ethics and Society
- Technology ethics are moral guidelines that govern the use of computers, mobile devices, information systems, and related technologies.
- Information accuracy is a concern, as not all online information is correct.
Information Privacy
- Information privacy is the right of individuals and companies to control the collection, use, and sharing of information about them.
- Huge databases store large amounts of online data.
- Websites often collect data to customize ads and send personalized emails.
- Some employers monitor computer and email use.
Information Privacy (Continued)
- A cookie is a small text file that a web server stores on a computer. It's used for personalization, storing user information, assisting in online shopping, tracking site visits, and targeting advertisements.
Information Privacy (Continued)
- Phishing is a scam where a perpetrator sends official-looking messages to obtain personal or financial information.
- Clickjacking involves malicious code embedded in a website's clickable elements.
Information Privacy (Continued)
- Spyware secretly collects user information from computers/mobile devices and sends it to an outside source.
- Adware uses banners, pop-ups, or pop-unders to display online advertisements.
Information Privacy (Continued)
- Social engineering involves gaining unauthorized access by exploiting trust and naivety.
- Federal and state laws regulate personal data storage and disclosure due to privacy concerns.
Information Privacy (Continued)
- Content filtering restricts access to specific materials.
- Web filtering software restricts access to certain websites.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Test your knowledge on cybersecurity concepts, including the functions of cookies, types of malware, and methods of authentication. This quiz covers essential topics related to online security measures and cyber threats. Get ready to challenge yourself and learn more about protecting digital information.