M.7 - Digital Security

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/71

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

72 Terms

1
New cards

Encryption

Transforms a message so contents hidden from unauthorized readers.

2
New cards

Plaintext

Original unencrypted message or file; cleartext

3
New cards

Ciphertext

Encrypted message or file.

4
New cards

Decryption

Converts ciphertext back to plaintext.

5
New cards

Cryptographic Algorithm

Procedure for encryption or decryption.

6
New cards

Cryptographic Key

Word/number/phrase required to encrypt or decrypt data.

7
New cards

AES

Advanced Encryption Standard used worldwide.

8
New cards

User Authentication

Technique to verify a person's identity in digital security.

9
New cards

Two-Factor Authentication

Uses two components to verify identity such as password + code.

10
New cards

Authentication - iOS

Short passcodes, long passwords, Face ID, Touch ID.

11
New cards

Authentication - Android

Many settings; does not auto-encrypt without enabling.

12
New cards

Authentication - Windows

Multiple sign-in options via Accounts settings.

13
New cards

Authentication - Mac

Password settings in Security & Privacy; FileVault encrypts data.

14
New cards

Password

Strong passwords are difficult to hack.

15
New cards

Brute Force Attack

Tries every possible combination; can take days.

16
New cards

Dictionary Attack

Steps through word lists to guess common passwords.

17
New cards

Weak Password Characteristics

Dictionary words, doubled words, defaults, dates, usernames, conventional capitalization.

18
New cards

Password Entropy

Measure of password unpredictability in bits.

19
New cards

Password Manager

Keeps track of passwords so user doesn't memorize them.

20
New cards

Strength Meter

Indicates password security.

21
New cards

Malware

Program designed to secretly enter a digital device.

22
New cards

Malware Exploit

action of secretly entering a digital device; 'payload'

23
New cards

Virus

Self-replicating code attaching to legitimate files.

24
New cards

Code Injection

Modifying executables by adding commands.

25
New cards

Side-Loading

Installing apps outside official stores.

26
New cards

Rootkit

Hides processes/privileges; enables root access.

27
New cards

Computer Worm

Sef-replicating program performing unauthorized activity.

28
New cards

Mass-Mailing Worm

Type of worm which spreads by sending itself to every address in the address book of an infected device

29
New cards

internet Worm

Type of worm which looks for vulnerabilities in operating systems/open communication ports/JavaScripts on Web Pages

30
New cards

File-Sharing Worm

Type of worm which copies itself into a shared folder under an innocuous name

31
New cards

Trojan

Program appearing useful while doing hidden malicious actions.

32
New cards

Dropper

Delivers malicious code onto a device.

33
New cards

Antivirus Software

Looks for and eliminates malware.

34
New cards

Virus Signature

Unique code sequence of malware.

35
New cards

Heuristic Analysis

Detects suspicious behavior; may cause false positives.

36
New cards

Online Intrusion

Unauthorized access via internet vulnerabilities.

37
New cards

RAT

Remote Access Trojan creating secret control link with the hacker.

38
New cards

Backdoor

Undocumented method to access device.

39
New cards

Ransomware

Locks device and demands payment.

40
New cards

Botnet

Network of hijacked devices controlled remotely.

41
New cards

DDoS Attack

Overloads services with traffic.

42
New cards

Zero-Day Attack

Exploits unknown software vulnerabilities.

43
New cards

Netstat

Lists open ports for diagnostics.

44
New cards

Firewall

Blocks unauthorized access, allows authorized traffic.

45
New cards

Spyware

Secretly gathers personal information.

46
New cards

Adware

Collects browsing data for targeted ads.

47
New cards

Keylogger

Records keystrokes to steal data.

48
New cards

MITM Attack

Third party intercepts communication.

49
New cards

Evil Twin

Fake Wi-Fi hotspot for interception.

50
New cards

Address Spoofing

Changes address to redirect traffic.

51
New cards

Digital Certificate Hack

Compromises TLS identity verification.

52
New cards

IMSI Catcher

Intercepts mobile signals and location.

53
New cards

IMSI

64-bit number that uniquely identifies a cellular device; International Mobile Subscriber Identity

54
New cards

Social Engineering

Deceptive practice that exploits human psychology by inducing victims to interact with a digital device in a way that is not in their best interest

55
New cards

Advance Fee Fraud

Scam promising money for a small fee.

56
New cards

Spam

Unsolicited mass messages.

57
New cards

CAN-SPAM Act

Anti-spam law passed by the U.S. Congress in 2003; Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003

58
New cards

Phishing

Emails masquerading as authority to steal data.

59
New cards

Spear Phishing

Targeted phishing to specific groups.

60
New cards

Pharming

Redirects traffic to fraudulent sites.

61
New cards

Safe Browsing

Service offered by Google that checks URLs against a list of suscpicious website URLs; used by Chrome, Safari, and Firefox

62
New cards

SmartScreen

Microsoft's version of Safe Browsing.

63
New cards

Rogue Antivirus

Fake virus warnings that install malware.

64
New cards

PUA/PUP

Unwanted apps/programs installed via deception.

65
New cards

Principles of Digital Citizenship

Respect, Educate, Protect in digital spaces.

66
New cards

CIA Triad

Confidentiality, Integrity, Availability.

67
New cards

Deepfakes

AI-generated fake media for scams/fraud.

68
New cards

VPN

Encrypts data and hides network activity.

69
New cards

IoT Security

Change defaults, update firmware, isolate devices.

70
New cards

Digital Minimization

Collect only needed data; delete when unnecessary.

71
New cards

Philippine DPA 2012

Protects privacy; enforced by NPC.

72
New cards

Sensitive Personal Information

SPI includes race, health, IDs, etc.