Podcast
Questions and Answers
What is a digital security risk?
What is a digital security risk?
All digital security risks are considered computer crimes.
All digital security risks are considered computer crimes.
False
What is malware?
What is malware?
Malicious software that acts without a user's knowledge to alter computer operations.
A program that blocks access to files until a payment is made is known as __________.
A program that blocks access to files until a payment is made is known as __________.
Signup and view all the answers
Which of the following types of malware collects user information without their knowledge?
Which of the following types of malware collects user information without their knowledge?
Signup and view all the answers
Match the malware types with their descriptions:
Match the malware types with their descriptions:
Signup and view all the answers
A Trojan horse replicates itself to spread to other computers.
A Trojan horse replicates itself to spread to other computers.
Signup and view all the answers
Name one major difference between a virus and a worm.
Name one major difference between a virus and a worm.
Signup and view all the answers
Information transmitted over networks is at a higher security risk than information kept on __________.
Information transmitted over networks is at a higher security risk than information kept on __________.
Signup and view all the answers
Which type of malware is specifically designed to disrupt the functioning of system resources?
Which type of malware is specifically designed to disrupt the functioning of system resources?
Signup and view all the answers
What is a botnet?
What is a botnet?
Signup and view all the answers
A passphrase is a numeric password assigned by a company.
A passphrase is a numeric password assigned by a company.
Signup and view all the answers
What is the purpose of a firewall?
What is the purpose of a firewall?
Signup and view all the answers
A compromised computer or device is known as a ______.
A compromised computer or device is known as a ______.
Signup and view all the answers
Match the following authentication methods to their descriptions:
Match the following authentication methods to their descriptions:
Signup and view all the answers
What does a denial of service attack (DoS) do?
What does a denial of service attack (DoS) do?
Signup and view all the answers
Spoofing makes a network transmission appear illegitimate.
Spoofing makes a network transmission appear illegitimate.
Signup and view all the answers
What is the function of access controls?
What is the function of access controls?
Signup and view all the answers
An example of a biometric device is a ______.
An example of a biometric device is a ______.
Signup and view all the answers
What is the primary role of an audit trail?
What is the primary role of an audit trail?
Signup and view all the answers
What can cookies be used for on websites?
What can cookies be used for on websites?
Signup and view all the answers
Adware is a type of program that secretly collects user information and sends it to an external source.
Adware is a type of program that secretly collects user information and sends it to an external source.
Signup and view all the answers
What is phishing?
What is phishing?
Signup and view all the answers
_________ is a program that collects information about users without their knowledge.
_________ is a program that collects information about users without their knowledge.
Signup and view all the answers
Match the following terms with their definitions:
Match the following terms with their definitions:
Signup and view all the answers
What is the main purpose of social engineering?
What is the main purpose of social engineering?
Signup and view all the answers
Clickjacking involves legitimate interfaces without any malicious intentions.
Clickjacking involves legitimate interfaces without any malicious intentions.
Signup and view all the answers
What does web filtering software do?
What does web filtering software do?
Signup and view all the answers
Employees might have their computer usage __________ by some employers.
Employees might have their computer usage __________ by some employers.
Signup and view all the answers
Which of these is NOT a purpose of cookies?
Which of these is NOT a purpose of cookies?
Signup and view all the answers
What does a hand geometry system verify?
What does a hand geometry system verify?
Signup and view all the answers
Iris recognition is a method used in digital forensics.
Iris recognition is a method used in digital forensics.
Signup and view all the answers
What is two-step verification?
What is two-step verification?
Signup and view all the answers
The process of converting data into encoded characters to prevent unauthorized access is called ______.
The process of converting data into encoded characters to prevent unauthorized access is called ______.
Signup and view all the answers
Match the following areas that use digital forensics with their primary focus:
Match the following areas that use digital forensics with their primary focus:
Signup and view all the answers
Which of the following best defines information privacy?
Which of the following best defines information privacy?
Signup and view all the answers
Not all information found on the web is accurate.
Not all information found on the web is accurate.
Signup and view all the answers
What is the main purpose of digital forensics?
What is the main purpose of digital forensics?
Signup and view all the answers
Information theft involves stealing ______ or confidential information.
Information theft involves stealing ______ or confidential information.
Signup and view all the answers
Which of the following methods is NOT a type of biometric verification?
Which of the following methods is NOT a type of biometric verification?
Signup and view all the answers
Study Notes
Digital Security Risks
- A digital security risk is any event or action that could cause loss or damage to a computer or mobile device's hardware, software, data, information, or processing capabilities.
- Computer crime is any illegal act involving computers or related devices.
- Cybercrime is an online or Internet-based illegal act.
Internet and Network Attacks
- Information transmitted over networks has a higher security risk than information kept on organizational premises.
- Malware is malicious software that acts without user knowledge, altering computer and mobile device operations.
Common Types of Malware
- Adware: Displays online advertisements on webpages, emails, or Internet services.
- Ransomware: Blocks or limits access to a computer, phone, or file until a payment is made.
- Rootkit: Hides within a computer or device, allowing remote control.
- Spyware: Secretly collects user information and sends it to an outside source.
- Trojan horse: Appears legitimate but contains malicious code. Doesn't replicate itself.
- Virus: A potentially damaging program that negatively affects a computer or device by altering its operations without permission.
- Worm: Copies itself repeatedly, using resources and potentially shutting down systems.
Internet and Network Attacks (continued)
- A botnet is a group of compromised computers or devices connected to a network. A compromised computer is known as a "zombie."
- A denial of service (DoS) attack disrupts computer access to an Internet service, a Distributed DoS attack (DDoS) is specifically more widespread
- A backdoor is a program that bypasses security controls.
- Spoofing is a technique that makes network or Internet transmissions appear legitimate.
Internet and Network Attacks (continued)
- A firewall is hardware and/or software that protects a network's resources from intrusion.
Unauthorized Access and Use
- Access controls define who can access a computer, device, or network, when they can access it, and the actions they can take.
- Computers, devices, or networks should maintain an audit trail of access attempts (both successful and unsuccessful).
- Examples of access controls include user names, passwords, passphrases, and PINs.
Unauthorized Access and Use (continued)
- Passphrases are private combinations of words, often containing mixed capitalization and punctuation, associated with a user name, allowing access to computer resources.
- PINs (Personal Identification Numbers) are numeric passwords, either assigned by a company or selected by a user.
Unauthorized Access and Use (continued)
- A possessed object is an item required to gain access to a computer or facility.
- Biometric devices authenticate a person's identity by translating a personal characteristic (e.g., fingerprint, face, iris, signature, voice) into a digital code.
Unauthorized Access and Use (continued)
- Examples of biometric devices include fingerprint readers, face recognition systems, hand geometry systems, iris recognition systems, and signature/voice verification systems.
Unauthorized Access and Use (continued)
- Two-step verification uses two separate methods to verify a user's identity.
Unauthorized Access and Use (continued)
- Digital forensics involves discovering, collecting, and analyzing evidence found on computers and networks.
- Many areas use digital forensics including law enforcement, criminal prosecutors, military intelligence, insurance agencies, and information security departments.
Information Theft
- Information theft occurs when someone steals personal or confidential information.
- Encryption is a process to convert readable data into encoded characters to prevent unauthorized access.
Ethics and Society
- Technology ethics are moral guidelines for the use of computers, mobile devices, information systems, and related technologies.
- Information accuracy is a concern since not all information on the web is correct.
Information Privacy
- Information privacy is the right of individuals and companies to control the collection, use, and dissemination of information about them.
- Huge online databases store information.
- Websites often collect data to personalize advertisements and email messages.
- Some employers monitor computer usage and email messages.
Information Privacy (continued)
- Cookies are small text files stored on a computer by web servers.
- Websites use cookies for personalization, storing user names/passwords, online shopping assistance, tracking visits, and targeted advertisements.
Information Privacy (continued)
- Phishing is a scam that sends official-looking messages to obtain personal and financial information.
- Clickjacking is when an object on a website contains a malicious program.
- Spyware is a program secretly collecting user information and communicating it to an outside source.
- Adware is a program that displays advertisements on webpages, emails, or Internet services.
Information Privacy (continued)
- Social engineering is gaining unauthorized access by taking advantage of human nature.
- Federal and state laws address privacy regarding personal data storage and disclosure.
- Content filtering restricts access to specific material.
- Web filtering software restricts access to particular websites.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
This quiz covers essential concepts related to digital security risks, including types of malware and cybercrime. Explore how these threats can impact devices, data, and online safety. Test your knowledge on protecting against these security challenges.