1/25
These flashcards cover key concepts related to digital currency, blockchain technology, and various cyber security threats.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Digital Currency
Currency that only exists in digital form, stored in digital wallets or accounts without physical banknotes or coins.
Blockchain
A digital ledger that records every transaction made with a particular digital currency, time-stamped and unalterably linked.
Volatility
The degree to which the value of a digital currency can fluctuate rapidly in a short period of time.
Cryptocurrency
A type of digital currency that uses cryptography for security and is tracked publically.
Brute-force Attack
An attack method where an attacker repeatedly tries multiple combinations of a user's password to gain unauthorized access.
Data Interception & Theft
A method where hackers compromise sensitive data, such as usernames and passwords, typically using a device like a packet sniffer.
DDoS Attack
A large-scale attack that floods a server with requests from multiple devices, causing the server to become unusable for genuine users.
Hacking
The process of exploiting weaknesses in a computer system to gain unauthorized access, often for malicious purposes.
Malware
Malicious software created to harm computer systems, causing various issues such as file loss or system slowdowns.
Pharming
A tactic used to redirect users to a fake website to steal sensitive information, often by altering DNS settings.
Phishing
The act of sending fraudulent emails or messages to trick individuals into providing personal details.
Social Engineering
Exploiting human weaknesses to gain unauthorized access to a system, often through manipulation or deceit.
Virus
A type of malware that attaches itself to legitimate software, replicating and spreading when the host program is executed.
Worm
A standalone malware that replicates itself to spread to other computers, often exploiting vulnerabilities in networked systems.
Trojan Horse
Malware disguised as legitimate software, which, once executed, can give unauthorized access to a user's system.
Ransomware
A type of malware that encrypts the victim's files, demanding a ransom to restore access.
Spyware
Malware that secretly monitors a user's actions and collects personal information without consent.
Adware
A form of malware that automatically delivers advertisements, often bundled with free software.
Keylogger
A type of spyware that records keystrokes to capture sensitive information, such as passwords.
Use Secure Connections
Always ensure that you are using secure connections (HTTPS) for websites to protect against pharming attacks.
Keep Software Updated
Regularly update your operating system and browsers to protect against vulnerabilities that may be exploited by pharmers.
Employ Security Software
Utilize antivirus and anti-malware software to detect and block malicious activities related to pharming.
Check URLs Carefully
Always double-check URLs before entering personal information to ensure you are on the legitimate site.
Use Strong Passwords
Create strong, unique passwords for your accounts to make it harder for attackers to gain unauthorized access.
Enable Two-Factor Authentication
Activate two-factor authentication on accounts when available for an added layer of security against unauthorized access.
Avoid Public Wi-Fi for Transactions
Refrain from using public Wi-Fi networks for sensitive transactions, as they can be less secure and more susceptible to attacks.