1/37
These flashcards cover key concepts and important definitions related to mitigating risks when connecting to the internet, focusing on threats, vulnerabilities, malware, and best practices.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
What are some categories of risk on the internet?
Hackers, malware, personal attacks, email attacks.
What is the objective of a hacker?
To gain access to a computer system or network to do harm, steal data, or both.
Name a method used by hackers to exploit systems.
Social engineering.
What motivates white hat hackers?
To improve security and protect systems.
What type of hacker is known for malicious intent?
Black hat hackers.
What do cyberterrorists aim to achieve?
To cause disruption and harm on a large scale, often for political purposes.
What is a common motivation for hackers?
Financial gain.
What does a denial of service (DoS) attack do?
Disrupts the normal functioning of a targeted computer or network.
How do viruses spread?
By attaching or inserting themselves into documents or files.
What is a worm in cybersecurity terms?
A self-replicating program that can spread without user intervention.
Define 'Trojan horse' in the context of malware.
Malware disguised as something desirable to trick users into downloading it.
What is a rootkit?
Malware that hides its presence while allowing remote access to the system.
What does spyware do?
Collects and transmits information about user activities and personal data.
Explain ransomware.
A type of malware that locks data and demands a ransom for access.
What are methods to prevent personal attacks online?
Be cautious with personal information and avoid suspicious contacts.
What is the function of a firewall?
To protect a network by controlling incoming and outgoing traffic.
What should you do if you suspect identity theft?
Monitor accounts and report to authorities.
What are phishing and its primary characteristic?
A fraudulent attempt to obtain sensitive information by pretending to be trustworthy.
How can users protect themselves from email attacks?
Do not open unsolicited emails or attachments.
What are common practices for website hosting?
Ensuring physical and logical security, adequate bandwidth, and technical support.
What does ICANN stand for?
Internet Corporation for Assigned Names and Numbers.
Describe the Domain Name System (DNS).
A service that translates domain names into IP addresses.
What is a top-level domain?
The last segment of a domain name, used to indicate the type or location of the organization.
What does encryption do?
Protects data by converting it into a coded format unreadable without a key.
Name a type of attack associated with DNS vulnerabilities.
Address spoofing.
What should users do to secure backups?
Ensure they are stored securely and protected from theft.
How can users mitigate risks from malware?
Keep software and anti-malware programs updated.
What is the purpose of intrusion detection systems (IDS)?
To monitor network traffic for suspicious activity.
What is a major risk associated with unsecured wireless networks?
Unauthorized access and data theft.
Identify a common sign of a fraudulent website.
Suspicious domain name or lack of contact information.
How often should applications be updated to maintain security?
Regularly, as updates become available.
What is malware?
Malicious software designed to harm or exploit any programmable device, service, or network.
What are some types of malware?
Viruses, worms, trojan horses, ransomware, spyware, adware.
What is ethical hacking?
The practice of intentionally probing for vulnerabilities in a system with the permission of the owner.
What is a security breach?
An incident that results in unauthorized access to sensitive data.
What does multi-factor authentication involve?
Using two or more verification methods to access a resource.
What is the purpose of a VPN?
To create a secure and private network connection over the internet.
What is social engineering in cybersecurity?
Manipulating individuals into divulging confidential information.