Safety and Security in the Digital Age – Week 11

0.0(0)
studied byStudied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/29

flashcard set

Earn XP

Description and Tags

30 fill-in-the-blank flashcards covering privacy, security threats, protection measures, encryption, and ethics based on the Week 11 lecture notes.

Last updated 12:57 PM on 8/3/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

30 Terms

1
New cards

Computer security protects __ and devices from damage or unauthorized access.

digital information

2
New cards

Online users desire control over how their __ is used.

personal information

3
New cards

Privacy is an individual’s ability to eliminate the collection, use, and __ of confidential personal information.

sale (monetization)

4
New cards

Small data/text files stored on your hard drive by websites are called __.

cookies

5
New cards

Cookies generated by advertising companies on a site you visit are known as __ cookies.

third-party (tracking)

6
New cards

Software or hardware that records every keystroke to steal data is called a __.

keylogger

7
New cards

A malicious program that replicates itself across networks and overloads systems is a __.

worm

8
New cards

A program disguised as something useful but actually harmful is called a __.

Trojan horse

9
New cards

The practice of manipulating people to divulge private data is known as __.

social engineering

10
New cards

Fake emails or sites that trick users into revealing credentials are examples of __.

phishing

11
New cards

Malicious software that encrypts your data and demands payment is called __.

ransomware

12
New cards

An individual who unlawfully breaks into computer systems is commonly called a __.

hacker

13
New cards

Computers secretly taken over and controlled remotely are referred to as __.

zombies

14
New cards

Flooding a system with traffic to disrupt service is a __ attack.

Denial of Service (DoS)

15
New cards

Coordinating many computers to flood a target is a __ attack.

Distributed Denial of Service (DDoS)

16
New cards

The study of encoding messages for secrecy is known as __.

cryptography

17
New cards

Encryption converts plaintext into __ text that only intended recipients can read.

cipher (encrypted)

18
New cards

Symmetric key encryption uses the __ key for both encryption and decryption.

same

19
New cards

Stealing the secret key in symmetric encryption is called key __.

interception

20
New cards

Adding a second verification step to logins is known as __.

Two-Factor Authentication (2FA)

21
New cards

Routing your internet traffic through a secure tunnel for privacy uses a __.

VPN (Virtual Private Network)

22
New cards

Software that filters unwanted email messages is called an __ program.

anti-SPAM

23
New cards

Strong passwords should contain at least __ characters.

eight (8)

24
New cards

Illegally using software or media without a license is known as software __.

piracy

25
New cards

Copying code or content without giving credit is called __.

plagiarism

26
New cards

Harassing or intimidating others online is termed __.

cyberbullying

27
New cards

Protecting emails from wiretapping is achieved with __ encryption (e.g., PGP).

email

28
New cards

Websites that secure financial transactions use __ protocol (indicated by HTTPS).

web site encryption / HTTPS

29
New cards

IoT devices collecting environmental and personal data pose a large-scale __ threat.

privacy (data-collection)

30
New cards

Employers may track workers’ computer activity using __ monitoring software.

employee