1/21
These flashcards cover key vocabulary and concepts related to e-security as outlined in Chapter 5 lecture notes.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Personal Data
Any data that can be used to identify or recognize someone.
De-identification
A strategy used to prevent an individual’s identity from being revealed by removing identifying items.
Pseudonymised Data
Information that cannot identify an individual without additional information kept separate from it.
Malware
Programs designed to cause damage, disruption, or gain unauthorized access to a computer.
Phishing
The fraudulent practice of sending emails pretending to be from reputable companies to induce individuals to reveal personal information.
Vishing
Voice phishing; a method where fraudsters use phone calls to trick individuals into divulging personal information.
Smishing
SMS phishing; involves sending fraudulent text messages to lure personal or financial information from the recipient.
Firewall
A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Penetration Testing
A simulated cyber attack against your computer system to check for exploitable vulnerabilities.
Ransomware
Malicious software that threatens to block access to a computer system or data until a ransom is paid.
Spyware
Software that collects information about a user's activities without their knowledge.
Digital Certificate
An electronic document used to prove the ownership of a public key.
Multi-Factor Authentication
An authentication method that requires two or more verification factors to gain access to a resource.
Adware
Software that automatically displays or downloads advertising material when a user is online.
Trojan Horse
A malicious program that misleads users of its true intent, often disguised as legitimate software.
Worm
A standalone malware computer program that replicates itself in order to spread to other computers.
Rootkit
A collection of tools that enables administrator-level access to a computer or a network while hiding its presence.
Scareware
Malicious software that tries to scare the user into purchasing unnecessary software to remove fictitious threats.
Identity Theft
The fraudulent acquisition and use of a person's private identifying information, usually for financial gain.
Metadata
Data that provides information about other data, often embedded in files.
Encryption
The process of converting information or data into a code to prevent unauthorized access.
What is worm malware?
Worm malware is a type of malicious software that replicates itself to spread to other computers, often exploiting vulnerabilities in the operating system or applications