Safety and Security in the Digital Age – Week 11

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/29

flashcard set

Earn XP

Description and Tags

30 fill-in-the-blank flashcards covering privacy, security threats, protection measures, encryption, and ethics based on the Week 11 lecture notes.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

30 Terms

1
New cards

Computer security protects __ and devices from damage or unauthorized access.

digital information

2
New cards

Online users desire control over how their __ is used.

personal information

3
New cards

Privacy is an individual’s ability to eliminate the collection, use, and __ of confidential personal information.

sale (monetization)

4
New cards

Small data/text files stored on your hard drive by websites are called __.

cookies

5
New cards

Cookies generated by advertising companies on a site you visit are known as __ cookies.

third-party (tracking)

6
New cards

Software or hardware that records every keystroke to steal data is called a __.

keylogger

7
New cards

A malicious program that replicates itself across networks and overloads systems is a __.

worm

8
New cards

A program disguised as something useful but actually harmful is called a __.

Trojan horse

9
New cards

The practice of manipulating people to divulge private data is known as __.

social engineering

10
New cards

Fake emails or sites that trick users into revealing credentials are examples of __.

phishing

11
New cards

Malicious software that encrypts your data and demands payment is called __.

ransomware

12
New cards

An individual who unlawfully breaks into computer systems is commonly called a __.

hacker

13
New cards

Computers secretly taken over and controlled remotely are referred to as __.

zombies

14
New cards

Flooding a system with traffic to disrupt service is a __ attack.

Denial of Service (DoS)

15
New cards

Coordinating many computers to flood a target is a __ attack.

Distributed Denial of Service (DDoS)

16
New cards

The study of encoding messages for secrecy is known as __.

cryptography

17
New cards

Encryption converts plaintext into __ text that only intended recipients can read.

cipher (encrypted)

18
New cards

Symmetric key encryption uses the __ key for both encryption and decryption.

same

19
New cards

Stealing the secret key in symmetric encryption is called key __.

interception

20
New cards

Adding a second verification step to logins is known as __.

Two-Factor Authentication (2FA)

21
New cards

Routing your internet traffic through a secure tunnel for privacy uses a __.

VPN (Virtual Private Network)

22
New cards

Software that filters unwanted email messages is called an __ program.

anti-SPAM

23
New cards

Strong passwords should contain at least __ characters.

eight (8)

24
New cards

Illegally using software or media without a license is known as software __.

piracy

25
New cards

Copying code or content without giving credit is called __.

plagiarism

26
New cards

Harassing or intimidating others online is termed __.

cyberbullying

27
New cards

Protecting emails from wiretapping is achieved with __ encryption (e.g., PGP).

email

28
New cards

Websites that secure financial transactions use __ protocol (indicated by HTTPS).

web site encryption / HTTPS

29
New cards

IoT devices collecting environmental and personal data pose a large-scale __ threat.

privacy (data-collection)

30
New cards

Employers may track workers’ computer activity using __ monitoring software.

employee