Podcast
Questions and Answers
What is a digital security risk?
What is a digital security risk?
- A legal action involving computers
- Any event causing a loss or damage to digital devices (correct)
- A virus that infects software
- A network connection failure
All digital security risks are considered computer crimes.
All digital security risks are considered computer crimes.
False (B)
What is malware?
What is malware?
Malicious software that acts without a user's knowledge to alter computer operations.
A program that blocks access to files until a payment is made is known as __________.
A program that blocks access to files until a payment is made is known as __________.
Which of the following types of malware collects user information without their knowledge?
Which of the following types of malware collects user information without their knowledge?
Match the malware types with their descriptions:
Match the malware types with their descriptions:
A Trojan horse replicates itself to spread to other computers.
A Trojan horse replicates itself to spread to other computers.
Name one major difference between a virus and a worm.
Name one major difference between a virus and a worm.
Information transmitted over networks is at a higher security risk than information kept on __________.
Information transmitted over networks is at a higher security risk than information kept on __________.
Which type of malware is specifically designed to disrupt the functioning of system resources?
Which type of malware is specifically designed to disrupt the functioning of system resources?
What is a botnet?
What is a botnet?
A passphrase is a numeric password assigned by a company.
A passphrase is a numeric password assigned by a company.
What is the purpose of a firewall?
What is the purpose of a firewall?
A compromised computer or device is known as a ______.
A compromised computer or device is known as a ______.
Match the following authentication methods to their descriptions:
Match the following authentication methods to their descriptions:
What does a denial of service attack (DoS) do?
What does a denial of service attack (DoS) do?
Spoofing makes a network transmission appear illegitimate.
Spoofing makes a network transmission appear illegitimate.
What is the function of access controls?
What is the function of access controls?
An example of a biometric device is a ______.
An example of a biometric device is a ______.
What is the primary role of an audit trail?
What is the primary role of an audit trail?
What can cookies be used for on websites?
What can cookies be used for on websites?
Adware is a type of program that secretly collects user information and sends it to an external source.
Adware is a type of program that secretly collects user information and sends it to an external source.
What is phishing?
What is phishing?
_________ is a program that collects information about users without their knowledge.
_________ is a program that collects information about users without their knowledge.
Match the following terms with their definitions:
Match the following terms with their definitions:
What is the main purpose of social engineering?
What is the main purpose of social engineering?
Clickjacking involves legitimate interfaces without any malicious intentions.
Clickjacking involves legitimate interfaces without any malicious intentions.
What does web filtering software do?
What does web filtering software do?
Employees might have their computer usage __________ by some employers.
Employees might have their computer usage __________ by some employers.
Which of these is NOT a purpose of cookies?
Which of these is NOT a purpose of cookies?
What does a hand geometry system verify?
What does a hand geometry system verify?
Iris recognition is a method used in digital forensics.
Iris recognition is a method used in digital forensics.
What is two-step verification?
What is two-step verification?
The process of converting data into encoded characters to prevent unauthorized access is called ______.
The process of converting data into encoded characters to prevent unauthorized access is called ______.
Match the following areas that use digital forensics with their primary focus:
Match the following areas that use digital forensics with their primary focus:
Which of the following best defines information privacy?
Which of the following best defines information privacy?
Not all information found on the web is accurate.
Not all information found on the web is accurate.
What is the main purpose of digital forensics?
What is the main purpose of digital forensics?
Information theft involves stealing ______ or confidential information.
Information theft involves stealing ______ or confidential information.
Which of the following methods is NOT a type of biometric verification?
Which of the following methods is NOT a type of biometric verification?
Flashcards
Digital Security Risk
Digital Security Risk
Any event or action that could harm a computer or mobile device, its software, data, or processing.
Computer Crime
Computer Crime
Any illegal act involving computers or related devices.
Cybercrime
Cybercrime
An illegal act committed online or using the internet.
Malware
Malware
Signup and view all the flashcards
Adware
Adware
Signup and view all the flashcards
Ransomware
Ransomware
Signup and view all the flashcards
Rootkit
Rootkit
Signup and view all the flashcards
Spyware
Spyware
Signup and view all the flashcards
Trojan Horse
Trojan Horse
Signup and view all the flashcards
Worm
Worm
Signup and view all the flashcards
Botnet
Botnet
Signup and view all the flashcards
Zombie
Zombie
Signup and view all the flashcards
Denial of service (DoS) attack
Denial of service (DoS) attack
Signup and view all the flashcards
Distributed DoS (DDoS) attack
Distributed DoS (DDoS) attack
Signup and view all the flashcards
Backdoor
Backdoor
Signup and view all the flashcards
Spoofing
Spoofing
Signup and view all the flashcards
Firewall
Firewall
Signup and view all the flashcards
Access controls
Access controls
Signup and view all the flashcards
Audit trail
Audit trail
Signup and view all the flashcards
Passphrase
Passphrase
Signup and view all the flashcards
Hand Geometry System
Hand Geometry System
Signup and view all the flashcards
Iris Recognition System
Iris Recognition System
Signup and view all the flashcards
Signature Verification System
Signature Verification System
Signup and view all the flashcards
Voice Verification System
Voice Verification System
Signup and view all the flashcards
Two-Step Verification
Two-Step Verification
Signup and view all the flashcards
Digital Forensics
Digital Forensics
Signup and view all the flashcards
Information Theft
Information Theft
Signup and view all the flashcards
Encryption
Encryption
Signup and view all the flashcards
Technology Ethics
Technology Ethics
Signup and view all the flashcards
Information Privacy
Information Privacy
Signup and view all the flashcards
What is a cookie?
What is a cookie?
Signup and view all the flashcards
What is phishing?
What is phishing?
Signup and view all the flashcards
What is clickjacking?
What is clickjacking?
Signup and view all the flashcards
What is spyware?
What is spyware?
Signup and view all the flashcards
What is adware?
What is adware?
Signup and view all the flashcards
What is social engineering?
What is social engineering?
Signup and view all the flashcards
What is content filtering?
What is content filtering?
Signup and view all the flashcards
What is web filtering software?
What is web filtering software?
Signup and view all the flashcards
What are privacy laws?
What are privacy laws?
Signup and view all the flashcards
What is a digital security risk?
What is a digital security risk?
Signup and view all the flashcards
Study Notes
Digital Security Risks
- A digital security risk is any event or action that could cause loss or damage to a computer or mobile device's hardware, software, data, information, or processing capabilities.
- Computer crime is any illegal act involving computers or related devices.
- Cybercrime is an online or Internet-based illegal act.
Internet and Network Attacks
- Information transmitted over networks has a higher security risk than information kept on organizational premises.
- Malware is malicious software that acts without user knowledge, altering computer and mobile device operations.
Common Types of Malware
- Adware: Displays online advertisements on webpages, emails, or Internet services.
- Ransomware: Blocks or limits access to a computer, phone, or file until a payment is made.
- Rootkit: Hides within a computer or device, allowing remote control.
- Spyware: Secretly collects user information and sends it to an outside source.
- Trojan horse: Appears legitimate but contains malicious code. Doesn't replicate itself.
- Virus: A potentially damaging program that negatively affects a computer or device by altering its operations without permission.
- Worm: Copies itself repeatedly, using resources and potentially shutting down systems.
Internet and Network Attacks (continued)
- A botnet is a group of compromised computers or devices connected to a network. A compromised computer is known as a "zombie."
- A denial of service (DoS) attack disrupts computer access to an Internet service, a Distributed DoS attack (DDoS) is specifically more widespread
- A backdoor is a program that bypasses security controls.
- Spoofing is a technique that makes network or Internet transmissions appear legitimate.
Internet and Network Attacks (continued)
- A firewall is hardware and/or software that protects a network's resources from intrusion.
Unauthorized Access and Use
- Access controls define who can access a computer, device, or network, when they can access it, and the actions they can take.
- Computers, devices, or networks should maintain an audit trail of access attempts (both successful and unsuccessful).
- Examples of access controls include user names, passwords, passphrases, and PINs.
Unauthorized Access and Use (continued)
- Passphrases are private combinations of words, often containing mixed capitalization and punctuation, associated with a user name, allowing access to computer resources.
- PINs (Personal Identification Numbers) are numeric passwords, either assigned by a company or selected by a user.
Unauthorized Access and Use (continued)
- A possessed object is an item required to gain access to a computer or facility.
- Biometric devices authenticate a person's identity by translating a personal characteristic (e.g., fingerprint, face, iris, signature, voice) into a digital code.
Unauthorized Access and Use (continued)
- Examples of biometric devices include fingerprint readers, face recognition systems, hand geometry systems, iris recognition systems, and signature/voice verification systems.
Unauthorized Access and Use (continued)
- Two-step verification uses two separate methods to verify a user's identity.
Unauthorized Access and Use (continued)
- Digital forensics involves discovering, collecting, and analyzing evidence found on computers and networks.
- Many areas use digital forensics including law enforcement, criminal prosecutors, military intelligence, insurance agencies, and information security departments.
Information Theft
- Information theft occurs when someone steals personal or confidential information.
- Encryption is a process to convert readable data into encoded characters to prevent unauthorized access.
Ethics and Society
- Technology ethics are moral guidelines for the use of computers, mobile devices, information systems, and related technologies.
- Information accuracy is a concern since not all information on the web is correct.
Information Privacy
- Information privacy is the right of individuals and companies to control the collection, use, and dissemination of information about them.
- Huge online databases store information.
- Websites often collect data to personalize advertisements and email messages.
- Some employers monitor computer usage and email messages.
Information Privacy (continued)
- Cookies are small text files stored on a computer by web servers.
- Websites use cookies for personalization, storing user names/passwords, online shopping assistance, tracking visits, and targeted advertisements.
Information Privacy (continued)
- Phishing is a scam that sends official-looking messages to obtain personal and financial information.
- Clickjacking is when an object on a website contains a malicious program.
- Spyware is a program secretly collecting user information and communicating it to an outside source.
- Adware is a program that displays advertisements on webpages, emails, or Internet services.
Information Privacy (continued)
- Social engineering is gaining unauthorized access by taking advantage of human nature.
- Federal and state laws address privacy regarding personal data storage and disclosure.
- Content filtering restricts access to specific material.
- Web filtering software restricts access to particular websites.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
This quiz covers essential concepts related to digital security risks, including types of malware and cybercrime. Explore how these threats can impact devices, data, and online safety. Test your knowledge on protecting against these security challenges.