Module5(A)

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/37

flashcard set

Earn XP

Description and Tags

These flashcards cover key concepts and important definitions related to mitigating risks when connecting to the internet, focusing on threats, vulnerabilities, malware, and best practices.

Last updated 3:30 AM on 3/26/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

38 Terms

1
New cards

What are some categories of risk on the internet?

Hackers, malware, personal attacks, email attacks.

2
New cards

What is the objective of a hacker?

To gain access to a computer system or network to do harm, steal data, or both.

3
New cards

Name a method used by hackers to exploit systems.

Social engineering.

4
New cards

What motivates white hat hackers?

To improve security and protect systems.

5
New cards

What type of hacker is known for malicious intent?

Black hat hackers.

6
New cards

What do cyberterrorists aim to achieve?

To cause disruption and harm on a large scale, often for political purposes.

7
New cards

What is a common motivation for hackers?

Financial gain.

8
New cards

What does a denial of service (DoS) attack do?

Disrupts the normal functioning of a targeted computer or network.

9
New cards

How do viruses spread?

By attaching or inserting themselves into documents or files.

10
New cards

What is a worm in cybersecurity terms?

A self-replicating program that can spread without user intervention.

11
New cards

Define 'Trojan horse' in the context of malware.

Malware disguised as something desirable to trick users into downloading it.

12
New cards

What is a rootkit?

Malware that hides its presence while allowing remote access to the system.

13
New cards

What does spyware do?

Collects and transmits information about user activities and personal data.

14
New cards

Explain ransomware.

A type of malware that locks data and demands a ransom for access.

15
New cards

What are methods to prevent personal attacks online?

Be cautious with personal information and avoid suspicious contacts.

16
New cards

What is the function of a firewall?

To protect a network by controlling incoming and outgoing traffic.

17
New cards

What should you do if you suspect identity theft?

Monitor accounts and report to authorities.

18
New cards

What are phishing and its primary characteristic?

A fraudulent attempt to obtain sensitive information by pretending to be trustworthy.

19
New cards

How can users protect themselves from email attacks?

Do not open unsolicited emails or attachments.

20
New cards

What are common practices for website hosting?

Ensuring physical and logical security, adequate bandwidth, and technical support.

21
New cards

What does ICANN stand for?

Internet Corporation for Assigned Names and Numbers.

22
New cards

Describe the Domain Name System (DNS).

A service that translates domain names into IP addresses.

23
New cards

What is a top-level domain?

The last segment of a domain name, used to indicate the type or location of the organization.

24
New cards

What does encryption do?

Protects data by converting it into a coded format unreadable without a key.

25
New cards

Name a type of attack associated with DNS vulnerabilities.

Address spoofing.

26
New cards

What should users do to secure backups?

Ensure they are stored securely and protected from theft.

27
New cards

How can users mitigate risks from malware?

Keep software and anti-malware programs updated.

28
New cards

What is the purpose of intrusion detection systems (IDS)?

To monitor network traffic for suspicious activity.

29
New cards

What is a major risk associated with unsecured wireless networks?

Unauthorized access and data theft.

30
New cards

Identify a common sign of a fraudulent website.

Suspicious domain name or lack of contact information.

31
New cards

How often should applications be updated to maintain security?

Regularly, as updates become available.

32
New cards

What is malware?

Malicious software designed to harm or exploit any programmable device, service, or network.

33
New cards

What are some types of malware?

Viruses, worms, trojan horses, ransomware, spyware, adware.

34
New cards

What is ethical hacking?

The practice of intentionally probing for vulnerabilities in a system with the permission of the owner.

35
New cards

What is a security breach?

An incident that results in unauthorized access to sensitive data.

36
New cards

What does multi-factor authentication involve?

Using two or more verification methods to access a resource.

37
New cards

What is the purpose of a VPN?

To create a secure and private network connection over the internet.

38
New cards

What is social engineering in cybersecurity?

Manipulating individuals into divulging confidential information.

Explore top notes

note
Science - Chapter 8
Updated 1058d ago
0.0(0)
note
Risk / Riesgo (IT)
Updated 1245d ago
0.0(0)
note
Chemistry Chapter 3
Updated 426d ago
0.0(0)
note
B1
Updated 1268d ago
0.0(0)
note
Body Disorders
Updated 1154d ago
0.0(0)
note
Conformity
Updated 1037d ago
0.0(0)
note
Impacts of Urbanization
Updated 1164d ago
0.0(0)
note
Science - Chapter 8
Updated 1058d ago
0.0(0)
note
Risk / Riesgo (IT)
Updated 1245d ago
0.0(0)
note
Chemistry Chapter 3
Updated 426d ago
0.0(0)
note
B1
Updated 1268d ago
0.0(0)
note
Body Disorders
Updated 1154d ago
0.0(0)
note
Conformity
Updated 1037d ago
0.0(0)
note
Impacts of Urbanization
Updated 1164d ago
0.0(0)

Explore top flashcards

flashcards
Camping Vocab
44
Updated 564d ago
0.0(0)
flashcards
Chemistry Unit 8 Ions
56
Updated 1117d ago
0.0(0)
flashcards
APUSH Vocab Quiz
30
Updated 1098d ago
0.0(0)
flashcards
Russia - APCG
47
Updated 1234d ago
0.0(0)
flashcards
Bio evolution test
41
Updated 12d ago
0.0(0)
flashcards
Genetics E1- Medical Pedigree
34
Updated 286d ago
0.0(0)
flashcards
Camping Vocab
44
Updated 564d ago
0.0(0)
flashcards
Chemistry Unit 8 Ions
56
Updated 1117d ago
0.0(0)
flashcards
APUSH Vocab Quiz
30
Updated 1098d ago
0.0(0)
flashcards
Russia - APCG
47
Updated 1234d ago
0.0(0)
flashcards
Bio evolution test
41
Updated 12d ago
0.0(0)
flashcards
Genetics E1- Medical Pedigree
34
Updated 286d ago
0.0(0)