1/29
30 fill-in-the-blank flashcards covering privacy, security threats, protection measures, encryption, and ethics based on the Week 11 lecture notes.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Computer security protects __ and devices from damage or unauthorized access.
digital information
Online users desire control over how their __ is used.
personal information
Privacy is an individual’s ability to eliminate the collection, use, and __ of confidential personal information.
sale (monetization)
Small data/text files stored on your hard drive by websites are called __.
cookies
Cookies generated by advertising companies on a site you visit are known as __ cookies.
third-party (tracking)
Software or hardware that records every keystroke to steal data is called a __.
keylogger
A malicious program that replicates itself across networks and overloads systems is a __.
worm
A program disguised as something useful but actually harmful is called a __.
Trojan horse
The practice of manipulating people to divulge private data is known as __.
social engineering
Fake emails or sites that trick users into revealing credentials are examples of __.
phishing
Malicious software that encrypts your data and demands payment is called __.
ransomware
An individual who unlawfully breaks into computer systems is commonly called a __.
hacker
Computers secretly taken over and controlled remotely are referred to as __.
zombies
Flooding a system with traffic to disrupt service is a __ attack.
Denial of Service (DoS)
Coordinating many computers to flood a target is a __ attack.
Distributed Denial of Service (DDoS)
The study of encoding messages for secrecy is known as __.
cryptography
Encryption converts plaintext into __ text that only intended recipients can read.
cipher (encrypted)
Symmetric key encryption uses the __ key for both encryption and decryption.
same
Stealing the secret key in symmetric encryption is called key __.
interception
Adding a second verification step to logins is known as __.
Two-Factor Authentication (2FA)
Routing your internet traffic through a secure tunnel for privacy uses a __.
VPN (Virtual Private Network)
Software that filters unwanted email messages is called an __ program.
anti-SPAM
Strong passwords should contain at least __ characters.
eight (8)
Illegally using software or media without a license is known as software __.
piracy
Copying code or content without giving credit is called __.
plagiarism
Harassing or intimidating others online is termed __.
cyberbullying
Protecting emails from wiretapping is achieved with __ encryption (e.g., PGP).
Websites that secure financial transactions use __ protocol (indicated by HTTPS).
web site encryption / HTTPS
IoT devices collecting environmental and personal data pose a large-scale __ threat.
privacy (data-collection)
Employers may track workers’ computer activity using __ monitoring software.
employee