Digital Currency and Cyber Security Threats

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/25

flashcard set

Earn XP

Description and Tags

These flashcards cover key concepts related to digital currency, blockchain technology, and various cyber security threats.

Last updated 6:31 AM on 4/22/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

26 Terms

1
New cards

Digital Currency

Currency that only exists in digital form, stored in digital wallets or accounts without physical banknotes or coins.

2
New cards

Blockchain

A digital ledger that records every transaction made with a particular digital currency, time-stamped and unalterably linked.

3
New cards

Volatility

The degree to which the value of a digital currency can fluctuate rapidly in a short period of time.

4
New cards

Cryptocurrency

A type of digital currency that uses cryptography for security and is tracked publically.

5
New cards

Brute-force Attack

An attack method where an attacker repeatedly tries multiple combinations of a user's password to gain unauthorized access.

6
New cards

Data Interception & Theft

A method where hackers compromise sensitive data, such as usernames and passwords, typically using a device like a packet sniffer.

7
New cards

DDoS Attack

A large-scale attack that floods a server with requests from multiple devices, causing the server to become unusable for genuine users.

8
New cards

Hacking

The process of exploiting weaknesses in a computer system to gain unauthorized access, often for malicious purposes.

9
New cards

Malware

Malicious software created to harm computer systems, causing various issues such as file loss or system slowdowns.

10
New cards

Pharming

A tactic used to redirect users to a fake website to steal sensitive information, often by altering DNS settings.

11
New cards

Phishing

The act of sending fraudulent emails or messages to trick individuals into providing personal details.

12
New cards

Social Engineering

Exploiting human weaknesses to gain unauthorized access to a system, often through manipulation or deceit.

13
New cards

Virus

A type of malware that attaches itself to legitimate software, replicating and spreading when the host program is executed.

14
New cards

Worm

A standalone malware that replicates itself to spread to other computers, often exploiting vulnerabilities in networked systems.

15
New cards

Trojan Horse

Malware disguised as legitimate software, which, once executed, can give unauthorized access to a user's system.

16
New cards

Ransomware

A type of malware that encrypts the victim's files, demanding a ransom to restore access.

17
New cards

Spyware

Malware that secretly monitors a user's actions and collects personal information without consent.

18
New cards

Adware

A form of malware that automatically delivers advertisements, often bundled with free software.

19
New cards

Keylogger

A type of spyware that records keystrokes to capture sensitive information, such as passwords.

20
New cards

Use Secure Connections

Always ensure that you are using secure connections (HTTPS) for websites to protect against pharming attacks.

21
New cards

Keep Software Updated

Regularly update your operating system and browsers to protect against vulnerabilities that may be exploited by pharmers.

22
New cards

Employ Security Software

Utilize antivirus and anti-malware software to detect and block malicious activities related to pharming.

23
New cards

Check URLs Carefully

Always double-check URLs before entering personal information to ensure you are on the legitimate site.

24
New cards

Use Strong Passwords

Create strong, unique passwords for your accounts to make it harder for attackers to gain unauthorized access.

25
New cards

Enable Two-Factor Authentication

Activate two-factor authentication on accounts when available for an added layer of security against unauthorized access.

26
New cards

Avoid Public Wi-Fi for Transactions

Refrain from using public Wi-Fi networks for sensitive transactions, as they can be less secure and more susceptible to attacks.