IT Social & Professional Issues Lecture 2

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is cybersecurity?

  • The protection of internet-connected systems from threats (correct)
  • The practice of malicious hacking
  • The management of data privacy
  • A type of social engineering

What is social engineering?

A broad range of malicious activities accomplished through human interactions.

Phishing is a type of social engineering.

True (A)

What does SMiShing involve?

<p>Phishing that uses mobile phones as the attack platform.</p> Signup and view all the answers

Ransomware allows access to a computer system until a payment is made.

<p>True (A)</p> Signup and view all the answers

Ransomware examples include WannaCry, NotPetya, and _____ .

<p>Locky</p> Signup and view all the answers

What is cryptojacking?

<p>Using target's computing resources to mine cryptocurrencies (C)</p> Signup and view all the answers

What is spyware?

<p>Malicious software installed without consent to access personal information.</p> Signup and view all the answers

Which of the following is a way to protect your data privacy?

<p>Secure your accounts (D)</p> Signup and view all the answers

Flashcards are hidden until you start studying

Study Notes

Introduction to Data & Information Security

  • Acknowledge potential interception of information during online interactions.
  • Cybersecurity is crucial for protecting systems from cyber threats.

Cybersecurity Overview

  • Definition: Protection of internet-connected systems (hardware, software, data).
  • Sources of data include:
    • Call data records from mobile phones.
    • Social networks (Facebook, Twitter, Instagram).
    • GPS data from mobile devices and photos.
    • License plate and congestion charge camera data.
    • Financial transactions (credit/debit cards, PayPal, ATM).
    • Airline passenger and loyalty program records.
    • User identification and device details (MAC address, IP address).
    • Loyalty cards, shipping info, and passport scanners.

Social Engineering

  • Definition: Malicious activities through human interactions and psychological manipulation.
  • Techniques can lead to security mistakes and disclose sensitive information.

Phishing Types

  • Phishing: Fraudulent messages aimed at revealing sensitive information or deploying malware.
  • Smishing: Phishing via mobile devices, targeting personal data such as bank information.
  • Vishing: Phishing through phone calls, seeking personal information via direct interaction or voicemails.

Protection Strategies

  • Education on cybersecurity practices.
  • Verify sources before sharing information.
  • Maintain caution during online engagements.

Malicious Software

  • Ransomware: Blocks access to systems until a ransom is paid.
    • Notable examples:
      • WannaCry (2017)
      • NotPetya (2017)
      • Locky (2016)
      • Cryptolocker (2013)
      • Ryuk (2018)
      • Sodinokibi (REvil) (2019)
      • DoppelPaymer (2019)
      • Maze (2019)
      • DarkSide (2020)
      • Medusa (2023)

Other Malware Types

  • Cryptomining Malware/Cryptojacking: Uses target’s resources to mine cryptocurrencies.
  • Spyware Viruses: Collect personal information without consent and relay it to unauthorized parties.

Internet Data Privacy

  • Refers to individual's privacy protection while online.
  • Strategies to enhance data privacy include:
    • Securing accounts.
    • Protecting web browsing activities.
    • Utilizing antivirus software.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

More Like This

Data Security and Threat Actors Quiz
30 questions
IT & Security Fundamentals
45 questions

IT & Security Fundamentals

InspirationalRhyme avatar
InspirationalRhyme
Use Quizgecko on...
Browser
Browser