Securing Your System: Protecting Your Digital Data and Devices

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/22

flashcard set

Earn XP

Description and Tags

Flashcards about securing computer systems, covering identity theft, hackers, viruses, malware, social engineering, firewalls, passwords, and data protection.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

23 Terms

1
New cards

Identity Theft

When a thief steals personal information and poses as you; the most financially damaging cybercrime for individuals.

2
New cards

Hacker

Anyone who unlawfully breaks into a computer system.

3
New cards

White-hat Hacker

Ethical hackers who use their hacking skills for defensive purposes.

4
New cards

Black-hat Hacker

Hackers who use their skills for illegal or malicious purposes.

5
New cards

Virus

A program that attaches to a computer program to spread to other computers, replicating itself and copying its code into other host files.

6
New cards

Malware

Software that has malicious intent.

7
New cards

Adware

Software that displays sponsored advertisements.

8
New cards

Spyware

Unwanted piggyback software that transmits information and uses tracking cookies.

9
New cards

Spam

Unwanted software or junk e-mail; tactics to minimize this include using a spam filter.

10
New cards

Cookies

Small text files received when visiting a website that help companies determine the effectiveness of their marketing.

11
New cards

Social Engineering

A technique using social skills to generate human interaction and lure individuals to reveal sensitive information.

12
New cards

Pretexting

Creating a scenario that sounds legitimate to lure individuals into revealing sensitive information.

13
New cards

Phishing

Luring people into revealing information through deceptive means.

14
New cards

Pharming

Malicious code planted on a computer to gather information.

15
New cards

Ransomware

Malware that attacks a system by encrypting critical files so the system is no longer operational.

16
New cards

Scareware

Malware that attempts to convince you something is wrong and to pay money to fix it.

17
New cards

Firewall

Software or hardware designed to protect computers from hackers.

18
New cards

Virus Signature

Portion of the virus code that’s unique to a particular computer virus.

19
New cards

Quarantining

Placing a virus in a secure area so it won’t spread to other files.

20
New cards

Inoculation

Records key attributes about your computer files and keep stats in secure place

21
New cards

Drive-by Download

Exploits weaknesses in operating systems, combatted by keeping the OS up to date.

22
New cards

Virtual Private Networks (VPNs)

Secure networks that are established using the public Internet infrastructure.

23
New cards

Backups

Copies of files used to replace lost or damaged originals.