Chapter 5 e-Security

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/21

flashcard set

Earn XP

Description and Tags

These flashcards cover key vocabulary and concepts related to e-security as outlined in Chapter 5 lecture notes.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

22 Terms

1
New cards

Personal Data

Any data that can be used to identify or recognize someone.

2
New cards

De-identification

A strategy used to prevent an individual’s identity from being revealed by removing identifying items.

3
New cards

Pseudonymised Data

Information that cannot identify an individual without additional information kept separate from it.

4
New cards

Malware

Programs designed to cause damage, disruption, or gain unauthorized access to a computer.

5
New cards

Phishing

The fraudulent practice of sending emails pretending to be from reputable companies to induce individuals to reveal personal information.

6
New cards

Vishing

Voice phishing; a method where fraudsters use phone calls to trick individuals into divulging personal information.

7
New cards

Smishing

SMS phishing; involves sending fraudulent text messages to lure personal or financial information from the recipient.

8
New cards

Firewall

A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

9
New cards

Penetration Testing

A simulated cyber attack against your computer system to check for exploitable vulnerabilities.

10
New cards

Ransomware

Malicious software that threatens to block access to a computer system or data until a ransom is paid.

11
New cards

Spyware

Software that collects information about a user's activities without their knowledge.

12
New cards

Digital Certificate

An electronic document used to prove the ownership of a public key.

13
New cards

Multi-Factor Authentication

An authentication method that requires two or more verification factors to gain access to a resource.

14
New cards

Adware

Software that automatically displays or downloads advertising material when a user is online.

15
New cards

Trojan Horse

A malicious program that misleads users of its true intent, often disguised as legitimate software.

16
New cards

Worm

A standalone malware computer program that replicates itself in order to spread to other computers.

17
New cards

Rootkit

A collection of tools that enables administrator-level access to a computer or a network while hiding its presence.

18
New cards

Scareware

Malicious software that tries to scare the user into purchasing unnecessary software to remove fictitious threats.

19
New cards

Identity Theft

The fraudulent acquisition and use of a person's private identifying information, usually for financial gain.

20
New cards

Metadata

Data that provides information about other data, often embedded in files.

21
New cards

Encryption

The process of converting information or data into a code to prevent unauthorized access.

22
New cards

What is worm malware?

Worm malware is a type of malicious software that replicates itself to spread to other computers, often exploiting vulnerabilities in the operating system or applications