Internet Threats & Cybersecurity Basics – Empowerment Technologies

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/35

flashcard set

Earn XP

Description and Tags

35 question-and-answer flashcards covering definitions, examples, and key details about Internet threats, famous worms, malware types, phishing techniques, and antivirus solutions from the Empowerment Technologies lecture.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

36 Terms

1
New cards

What are “Internet threats” in the context of Empowerment Technologies?

Dangers or risks encountered online that can damage computers, steal personal data, or harm users emotionally or financially.

2
New cards

Define malware.

Malicious software intended to infiltrate, damage, or disable computers and networks.

3
New cards

Give four common forms of malware.

Viruses, worms, Trojan horses, spyware (also adware, ransomware, etc.).

4
New cards

List at least four common ways malware can spread.

Spam-email attachments, malicious websites, popup ads, P2P file sharing, infected USB/storage devices.

5
New cards

What distinguishes a computer virus from other malware?

It self-replicates by attaching to legitimate files and spreads via Internet, local networks, or storage media.

6
New cards

How is a computer worm different from a virus?

A worm is self-replicating but spreads independently across networks without attaching to files.

7
New cards

Who created the ILOVEYOU worm?

Filipino programmers Reonel Ramones and Onel de Guzman.

8
New cards

On what date did the ILOVEYOU worm begin infecting computers?

5 May 2000.

9
New cards

What subject line and attachment name were used by the ILOVEYOU worm?

Subject: “ILOVEYOU”; Attachment: “LOVE-LETTER-FOR-YOU.TXT.vbs”.

10
New cards

Why did many users think the ILOVEYOU attachment was harmless?

Windows hid the .vbs extension by default, making it appear to be a normal text file.

11
New cards

Describe two main actions the ILOVEYOU worm performed after activation.

(1) Overwrote or hid local files (e.g., Office, image, MP3). (2) E-mailed itself to all contacts in the Outlook Address Book.

12
New cards

Define a Trojan horse in cybersecurity.

Malicious software disguised as a useful program that, once installed, leaves the PC vulnerable to attackers.

13
New cards

What is rogue security software?

A fake security program that tricks users into paying for false protection while offering no real security.

14
New cards

Explain spyware.

Software that secretly runs in the background to monitor user activity, often via keylogging.

15
New cards

What is Wi-Fi eavesdropping?

Cyber-criminals’ practice of intercepting data shared over an unencrypted Wi-Fi network.

16
New cards

State the purpose of keyloggers.

To record keystrokes in order to steal passwords or other sensitive information.

17
New cards

Differentiate hardware and software keyloggers.

Hardware keyloggers are physical devices attached to keyboards; software keyloggers are programs running on the computer.

18
New cards

Define adware.

A program designed to deliver advertisements, usually through persistent pop-ups.

19
New cards

What is spam?

Unwanted email, often from bots or advertisers, potentially used to spread malware.

20
New cards

What is a bot (in Internet terms)?

Automated software that performs tasks online; can be beneficial (e.g., Googlebot) or malicious (e.g., spam bot).

21
New cards

State the primary goal of phishing.

To acquire sensitive personal information (passwords, credit-card numbers) by directing victims to fraudulent websites.

22
New cards

What is spoofing in relation to phishing?

Creating fake emails, messages, or websites that imitate legitimate companies to trick users.

23
New cards

Define pharming.

Redirecting users from legitimate URLs to malicious sites, even when the correct address is entered.

24
New cards

What is hacking?

Actions taken to gain unauthorized access to a computer or network.

25
New cards

Describe ransomware.

Malware that restricts access to a computer or files and demands payment to remove the restriction.

26
New cards

What is the main function of antivirus software?

To detect, prevent, and remove cyber threats such as malware, spyware, and phishing attacks.

27
New cards

Name three antivirus products listed in the lecture.

Possible answers: Avast, McAfee, Bitdefender, Norton, Avira, F-Secure, Trend Micro, Webroot, ESET NOD32, G-Data, Comodo.

28
New cards

Which antivirus solution was described as a lightweight option?

Webroot SecureAnywhere AntiVirus.

29
New cards

Which antivirus brand markets itself with the slogan “Together is power”?

McAfee.

30
New cards

What feature does Bitdefender highlight for its Antivirus Plus product?

Smooth protection and top overall rating (✰✰).

31
New cards

Which antivirus software emphasizes protection against hackers, ransomware, and phishing and offers a 30-day trial?

ESET NOD32 Antivirus.

32
New cards

Identify one German-origin antivirus product mentioned.

G-Data Antivirus.

33
New cards

Which company offers a full protection suite including antivirus and firewall for $39.99/year?

Comodo Windows Antivirus.

34
New cards

Give two benefits of using reputable antivirus software.

(1) Real-time detection/removal of malware; (2) Protection against phishing, ransomware, and other emerging threats.

35
New cards

List three best practices besides antivirus software to reduce Internet threats.

Updating software regularly, using strong unique passwords, avoiding suspicious links/attachments.

36
New cards

Why is it important for users to stay informed about new cyber threats?

Threats continuously evolve (e.g., cryptojacking) and awareness helps users adapt defenses accordingly.