Digital Awareness - Cyber Security

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/175

flashcard set

Earn XP

Description and Tags

A comprehensive set of flashcards focusing on key concepts and terms related to digital awareness and cybersecurity.

Last updated 7:42 AM on 3/7/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

176 Terms

1
New cards

Cyberspace

The virtual environment in which electronic communication occurs.

2
New cards

Internet

A global network connecting millions of computers worldwide.

3
New cards

Firewall

A network security system that monitors and controls incoming and outgoing network traffic.

4
New cards

Antivirus Software

Software designed to detect and remove malicious software from computer systems.

5
New cards

Phishing

Attempt to deceive individuals into providing sensitive information by posing as a trustworthy entity.

6
New cards

Malware

Malicious software designed to harm, exploit, or otherwise compromise computer systems.

7
New cards

Ransomware

A type of malware that encrypts a user's files and demands payment for decryption.

8
New cards

Zero-Day Attack

An exploit that takes advantage of a computer application vulnerability on the same day that it becomes known.

9
New cards

E- Commerce

Buying and selling of goods and services over the internet.

10
New cards

Online Banking

Internet-based services that allow users to conduct various banking activities.

11
New cards

Digital Wallet

A digital version of a physical wallet that stores payment information for online and in-person transactions.

12
New cards

Two-Factor Authentication (2FA)

An additional layer of security that requires not only a password but also a second form of verification.

13
New cards

Social Engineering

Manipulation of individuals into divulging confidential or personal information.

14
New cards

Cloud Computing

The delivery of computing services over the internet.

15
New cards

Data Breach

A security incident where unauthorized access to protected data occurs.

16
New cards

Identity Theft

Unauthorized acquisition and use of someone else's personal information.

17
New cards

Cyberbullying

Harassing someone through electronic means, often via social media.

18
New cards

Internet of Things (IoT)

The interconnection of physical devices that can collect and exchange data.

19
New cards

Academic Bank of Credit (ABC)

A system where academic credits earned by students are stored and managed centrally.

20
New cards

Digital Literacy

The ability to effectively use digital technology and communication tools.

21
New cards

Encryption

The process of converting information into a code to prevent unauthorized access.

22
New cards

Hashtag

A word or phrase preceded by a hash symbol that categorizes content on social media.

23
New cards

Online Fraud

Various fraudulent schemes conducted over the internet.

24
New cards

Denial of Service (DoS)

An attack intended to make a machine or network resource unavailable to its intended users.

25
New cards

Social Media Platforms

Online services or applications that allow users to create, share, and exchange content.

26
New cards

Data Security

The process of protecting data from unauthorized access and corruption.

27
New cards

Cyber Crime

Criminal activity carried out by means of computers or the internet.

28
New cards

Legal Compliance

Adherence to laws and regulations relevant to business operations.

29
New cards

Incident Response Plan

A predetermined set of instructions to follow when a cyberattack occurs.

30
New cards

Digital Payments

Transaction methods conducted over the internet or through mobile technology.

31
New cards

Advanced Persistent Threat (APT)

A prolonged and targeted cyberattack wherein an attacker gains access to a network and remains undetected.

32
New cards

Victim Support

Assistance provided to individuals affected by cyber crimes.

33
New cards

Secure Socket Layer (SSL)

A standard security technology for establishing an encrypted link between a server and a client.

34
New cards

Online Learning Resources

Educational materials available on the internet for self-paced learning.

35
New cards

National Cyber Security Policy

A government initiative aimed at securing the nation’s cyberspace.

36
New cards

Cyber Ethics

The study of moral, legal, and social issues related to cyberspace.

37
New cards

Digital Footprint

The trail of data you leave behind when you use the internet.

38
New cards

Artificial Intelligence (AI)

Simulation of human intelligence processes by machines.

39
New cards

Machine Learning (ML)

A subset of AI that involves the use of algorithms to parse data, learn from it, and make decisions.

40
New cards

Biometrics

Authentication techniques that rely on measurable physical characteristics of the user.

41
New cards

Privacy Policy

A legal document that explains how customer information is collected, used, and protected.

42
New cards

User Authentication

The process of determining whether someone or something is, in fact, who or what it is declared to be.

43
New cards

Vulnerability Assessment

The process of identifying weaknesses in a system or application.

44
New cards

Social Media Marketing

The use of social media platforms to promote products or services.

45
New cards

e-Government

The use of digital tools and systems to provide public services.

46
New cards

Content Management System (CMS)

Software for creating, managing, and modifying digital content.

47
New cards

Digital Signature

An electronic signature that verifies the authenticity and integrity of a message.

48
New cards

Incident Reporting

The formal process of notifying authorities or managers about security incidents.

49
New cards

Risk Management

The process of identifying, assessing, and controlling threats to an organization's assets.

50
New cards

Public Key Infrastructure (PKI)

A framework for managing digital certificates and public-key encryption.

51
New cards

Data Governance

The overall management of the availability, usability, integrity, and security of data.

52
New cards

Mobile Security

Protecting both personal and enterprise information stored on mobile devices.

53
New cards

Web Application Firewall (WAF)

A security system that monitors and filters HTTP traffic between a web application and the Internet.

54
New cards

Supply Chain Attack

A cyberattack that seeks to damage an organization by targeting less-secure elements in the supply chain.

55
New cards

Online Activism

Using digital tools to promote social, political, or environmental change.

56
New cards

National Investigation Agency (NIA)

An agency in India responsible for combating terrorism in the country.

57
New cards

Internet Protocol (IP)

A set of rules governing the format of data sent over the Internet.

58
New cards

Cybersecurity Framework

A structure that guides organizations in managing and reducing cyber risk.

59
New cards

Backups

Copies of data that are made to recover information in case of loss.

60
New cards

Intellectual Property Rights (IPR)

Legal rights that protect creations and inventions.

61
New cards

Privacy Settings

Controls that allow users to set restrictions on who can see their information or posts.

62
New cards

Digital Thefts

Unauthorized access and theft of digital information or assets.

63
New cards

Secure File Transfer Protocol (SFTP)

A secure version of the file transfer protocol for transferring files over a secure connection.

64
New cards

Compliance Audits

Systematic examinations of an organization’s adherence to regulatory guidelines.

65
New cards

Cloud Deployment Models

Different methods of deploying cloud services including public, private, hybrid, and community clouds.

66
New cards

User Access Levels

Different permissions given to users based on their role in a system.

67
New cards

Encryption Standards

Specifications that outline how encryption will be applied.

68
New cards

Digital Rights Management (DRM)

Technologies used to control access to copyrighted works.

69
New cards

Online Citation

The practice of referencing other digital works in an electronic format.

70
New cards

Cybersecurity Trends

Patterns and developments in the field of cybersecurity.

71
New cards

Content Delivery Network (CDN)

A system of distributed servers that deliver web content based on the user’s location.

72
New cards

Ad Fraud

A deceptive practice used to generate false impressions or clicks on ads.

73
New cards

Cybersecurity Training Programs

Educational initiatives designed to improve individuals' skills in protecting information.

74
New cards

Digital Sovereignty

The concept that countries have authority over their own cyberspaces.

75
New cards

E-Governance Services

Public services and information accessed electronically by citizens.

76
New cards

Cyber Crime Units

Specialized law enforcement teams focused on investigating cybercrime.

77
New cards

Digital Forensics

The process of recovering and investigating material found in digital devices.

78
New cards

Legislation on Cyber Crime

Laws established to define and govern actions considered cybercrimes.

79
New cards

Data Loss Prevention (DLP)

Strategies and tools to ensure sensitive data is not lost or accessed by unauthorized users.

80
New cards

Cybersecurity Insurance

Insurance designed to protect organizations from losses related to cyber incidents.

81
New cards

Emerging Cyber Threats

New and evolving risks to cybersecurity, including phenomena like hacking, phishing, and malware.

82
New cards

Smart Contract Security

Protocols for ensuring the security of digital contracts executed over blockchain.

83
New cards

Digital Currency Regulation

Laws and guidelines governing the use and exchange of digital currencies.

84
New cards

User Behavior Analytics (UBA)

Tools and processes aimed at delivering insights on user actions to identify potential breaches.

85
New cards

Ethical Hacking

The practice of intentionally probing systems for vulnerabilities in order to fix them.

86
New cards

Incident Command System (ICS)

A standardized approach to the command, control, and coordination of emergency response.

87
New cards

Browser Security Features

Settings and functionalities within web browsers that help protect against online threats.

88
New cards

Biometric Data Protection

Safeguarding personal information derived from biometric identifiers.

89
New cards

Cloud Service Model

Types of cloud services like SaaS, PaaS, and IaaS.

90
New cards

User Engagement Metrics

Statistics that measure interactions between users and digital content.

91
New cards

Data Breach Response Plan

Prepared strategies for minimizing damage from data breaches.

92
New cards

IoT Security Frameworks

Guidelines to secure Internet of Things devices and networks.

93
New cards

Legacy System Integration

Connecting older operational systems with latest technologies to ensure smooth data flow.

94
New cards

Social Media Analytics

The process of gathering data from social media platforms to draw insights.

95
New cards

Cybersecurity Testing

Evaluating the security posture of an organization through various methodologies such as penetration testing.

96
New cards

Digital Asset Management

The process of organizing, storing, and retrieving digital assets in a cohesive manner.

97
New cards

Workforce Cybersecurity Training

Programs aimed at increasing employees' knowledge of cybersecurity practices.

98
New cards

Online Messaging Security

Protocols for securing communications transmitted over messaging platforms.

99
New cards

Digital Communication Strategy

Plan for utilizing online channels effectively to communicate with stakeholders.

100
New cards

Vulnerability Disclosure Policy

Guidelines that dictate how vulnerabilities found in software should be reported.

Explore top notes

note
Introduction to Anxiety
Updated 1136d ago
0.0(0)
note
Psychology SAC Unit 2 AOS1
Updated 547d ago
0.0(0)
note
Chapter 1 : What is an algorithm?
Updated 1180d ago
0.0(0)
note
Growth of Industry Notes
Updated 527d ago
0.0(0)
note
Unit 7: Period 7: 1890–1945
Updated 65d ago
0.0(0)
note
Introduction to Anxiety
Updated 1136d ago
0.0(0)
note
Psychology SAC Unit 2 AOS1
Updated 547d ago
0.0(0)
note
Chapter 1 : What is an algorithm?
Updated 1180d ago
0.0(0)
note
Growth of Industry Notes
Updated 527d ago
0.0(0)
note
Unit 7: Period 7: 1890–1945
Updated 65d ago
0.0(0)

Explore top flashcards

flashcards
Patho exam 4
75
Updated 704d ago
0.0(0)
flashcards
week 3
72
Updated 761d ago
0.0(0)
flashcards
AP Human Geography Vocab Unit 5
76
Updated 1109d ago
0.0(0)
flashcards
Chapter 9- Management
91
Updated 1080d ago
0.0(0)
flashcards
Freedom/Liberty
31
Updated 1033d ago
0.0(0)
flashcards
Patho exam 4
75
Updated 704d ago
0.0(0)
flashcards
week 3
72
Updated 761d ago
0.0(0)
flashcards
AP Human Geography Vocab Unit 5
76
Updated 1109d ago
0.0(0)
flashcards
Chapter 9- Management
91
Updated 1080d ago
0.0(0)
flashcards
Freedom/Liberty
31
Updated 1033d ago
0.0(0)