Podcast
Questions and Answers
Which principle ensures that data is only collected for its intended purpose?
Which principle ensures that data is only collected for its intended purpose?
- Kept longer than necessary
- Maintained for excess usage
- Processed for the stated purpose (correct)
- Fairly and lawfully processed
How should data be maintained to comply with privacy standards?
How should data be maintained to comply with privacy standards?
- Shared freely without restrictions
- Accessible to all users
- Kept secure and accurate (correct)
- Stored indefinitely
What is the primary use of user accounts in a computing environment?
What is the primary use of user accounts in a computing environment?
- To run applications
- To monitor online activities
- To manage hardware resources
- To authenticate a user (correct)
What method is commonly used to authenticate a user?
What method is commonly used to authenticate a user?
Which of the following characteristics should a strong password include?
Which of the following characteristics should a strong password include?
What is one primary function of firewalls?
What is one primary function of firewalls?
What should be avoided when transferring data internationally?
What should be avoided when transferring data internationally?
Which of the following is NOT a way to protect passwords?
Which of the following is NOT a way to protect passwords?
How do firewalls assist in protecting devices?
How do firewalls assist in protecting devices?
What is a key component of maintaining user security in online activities?
What is a key component of maintaining user security in online activities?
Which of the following is NOT a recommended practice for creating secure passwords?
Which of the following is NOT a recommended practice for creating secure passwords?
What types of firewalls exist?
What types of firewalls exist?
Why is it necessary to regularly change passwords?
Why is it necessary to regularly change passwords?
What alert feature do firewalls provide?
What alert feature do firewalls provide?
What is one of the threats that firewalls help protect against?
What is one of the threats that firewalls help protect against?
Which of the following is a misconception about strong passwords?
Which of the following is a misconception about strong passwords?
What is a primary function of antivirus software?
What is a primary function of antivirus software?
What does the process of encryption primarily aim to achieve?
What does the process of encryption primarily aim to achieve?
Which of the following is NOT a type of biometric recognition?
Which of the following is NOT a type of biometric recognition?
How do ethical hackers differ from malicious hackers?
How do ethical hackers differ from malicious hackers?
Which method is recommended to detect dormant viruses?
Which method is recommended to detect dormant viruses?
What assurance does encryption provide?
What assurance does encryption provide?
What is a common mitigation strategy against malicious hacking?
What is a common mitigation strategy against malicious hacking?
What is the primary risk associated with malware?
What is the primary risk associated with malware?
What should you avoid doing to respect others' privacy online?
What should you avoid doing to respect others' privacy online?
Why is it important to share personal information wisely?
Why is it important to share personal information wisely?
What is a key aspect of acknowledging cultural differences online?
What is a key aspect of acknowledging cultural differences online?
What is an appropriate action to take regarding trolling or harassment online?
What is an appropriate action to take regarding trolling or harassment online?
Which of the following is a recommendation for managing content shared online?
Which of the following is a recommendation for managing content shared online?
What is a characteristic of worms in the context of computer security?
What is a characteristic of worms in the context of computer security?
What action should be taken to help prevent phishing attacks?
What action should be taken to help prevent phishing attacks?
Which of the following best describes a Trojan in computer security?
Which of the following best describes a Trojan in computer security?
What does two-factor authentication (2FA) provide?
What does two-factor authentication (2FA) provide?
What is spy software primarily used for?
What is spy software primarily used for?
How can users verify unsecured links in emails?
How can users verify unsecured links in emails?
Which statement is a misconception about preventing phishing?
Which statement is a misconception about preventing phishing?
Which description best fits logic bombs?
Which description best fits logic bombs?
Flashcards are hidden until you start studying
Study Notes
Strong Passwords
- Strong passwords are difficult to crack or guess.
- Should include at least one capital letter.
- Should include at least one numerical value.
- Should include at least one other keyboard character (such as @, *, &).
Firewalls
- Act as a barrier between your device and the internet.
- Can be software or hardware-based.
- Monitor and filter information going in and out of your device.
- Allow users to approve or deny communication from external sources.
- Tasks:
- Examine traffic between devices and public networks.
- Block traffic that doesn't match specific criteria.
- Log all incoming and outgoing traffic for future analysis.
- Prevent access to harmful IP addresses.
- Help protect against viruses and hackers.
- Warn users if any software tries connecting to external data sources.
Antivirus Software
- Continuously monitors for virus attacks in the background.
- Common functions:
- Checking software/files prior to execution.
- Comparison with known virus database.
- Heuristic checking for suspicious behavior.
- Quarantine suspect files; allowing automatic removal or manual review.
- Requires regular updates due to constant discovery of new viruses.
- Weekly full system scans are recommended to detect dormant viruses.
Encryption
- Alters readable data (plaintext) into an unreadable format (ciphertext).
- Uses a mathematical process with an encryption algorithm and a key.
- The key and process are complex enough to make brute force attack extremely unlikely.
- Decryption reverses the process using the same key or a different decryption key.
- Offers no protection against file deletion.
- Safeguards data integrity and confidentiality.
Biometrics
- Uses the unique characteristics of human beings to enhance security.
- Examples include fingerprint scans, retina scans, face recognition, and voice recognition.
Hacking
- Unauthorized access to a system with the intent to cause harm.
- Types:
- Malicious: Aims at stealing sensitive information, modifying files.
- Ethical: Authorized testing, evaluating cyber security strength, legal, commissioned by organizations.
Malware
- Small programs that pose a threat to data integrity and security.
- Types:
- Viruses: Self-replicate, delete or corrupt files, need active host programs.
- Worms: Standalone viruses seeking other vulnerable computers via networks.
- Logic Bombs: Embedded codes triggered under specific conditions.
- Trojans: Harmful programs disguised as legitimate software.
- Bots: Automated scripts vulnerable to unauthorized takeover and attacks.
- Spyware: Monitors keystrokes, sends gathered information to a sender (keylogging).
Phishing
- Emails that look legitimate but contain links or attachments that lead to fake websites or trick users into revealing personal information.
- How to prevent:
- Be vigilant for new scams.
- Avoid clicking unconfirmed links and unknown file downloads.
- Be cautious of offers that are too good to be true.
- Utilize anti-phishing toolbars on web browsers for warnings.
- Periodically examine digital accounts and modify passwords routinely.
Two-Factor Authentication (2FA)
- Requires two forms of authentication for account login.
- Uses username/password combo with a second authentication factor like a phone number, fingerprint, or security code.
- Often involves a one-time code (OTP) sent to a mobile device or email address.
- Confirms account ownership before granting access.
Internet Ethics
- Acknowledge and accept cultural differences online.
- Refuse to participate in online abuse and harassment.
- Keep spam to a minimum.
- Share content that is meaningful.
- Respect others' privacy.
- Be cautious about sharing personal information online.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.