Computing and Cybersecurity: Identity Theft, Information Warfare, and Cyber Espionage

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/49

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 5:32 AM on 4/21/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

50 Terms

1
New cards

What is identity theft also commonly called?

Identity theft is also commonly called identity fraud.

2
New cards

What occurs during identity theft?

Identity theft occurs when someone obtains personal information to impersonate another person.

3
New cards

What is an example of personally identifiable information (PII)?

An example of personally identifiable information (PII) is a Social Security number.

4
New cards

What type of identity theft involves fraudulent use of healthcare services?

The type of identity theft that involves fraudulent use of healthcare services is called medical identity theft.

5
New cards

What is identity theft targeting minors called?

Identity theft targeting minors is called child identity theft.

6
New cards

What technique involves stealing personal information from discarded documents?

The technique that involves stealing personal information from discarded documents is called dumpster diving.

7
New cards

What is the act of secretly observing someone entering confidential information called?

The act of secretly observing someone entering confidential information is called shoulder surfing.

8
New cards

Which social engineering technique involves sending fake messages to trick users into revealing information?

The social engineering technique that involves sending fake messages to trick users is called phishing.

9
New cards

Why do employers often monitor workplace activities?

Employers often monitor workplace activities primarily to protect company resources and security.

10
New cards

What occurs during an invasion of privacy?

Invasion of privacy occurs when an individual intrudes where privacy is expected.

11
New cards

What is a form of invasion of privacy?

A form of invasion of privacy is a violation of confidentiality.

12
New cards

What approach focuses on minimizing the amount of personal data shared online?

The approach that focuses on minimizing the amount of personal data shared online is called privacy-first.

13
New cards

What is information warfare primarily aimed at achieving?

Information warfare is primarily aimed at achieving information superiority.

14
New cards

What does information warfare involve?

Information warfare involves manipulating information so that the target makes decisions against their interests.

15
New cards

Which of the following is NOT a form of information warfare?

File backup systems are NOT a form of information warfare.

16
New cards

What is an example of information warfare?

Disabling communication networks of an opponent is an example of information warfare.

17
New cards

What is a weapon of information warfare?

Information manipulation is a weapon of information warfare.

18
New cards

Which type of information warfare focuses on hacking activities?

The type of information warfare that focuses on hacking activities is called electronic warfare.

19
New cards

What is the practice of spying to obtain confidential information called?

The practice of spying to obtain confidential information is called espionage.

20
New cards

What does cyber espionage use ICT primarily for?

Cyber espionage uses ICT primarily to collect intelligence or gain economic advantage.

21
New cards

Who may conduct cyber espionage?

Cyber espionage may be conducted by government actors, businesses, and organized groups.

22
New cards

What does intelligence gathering refer to?

Intelligence gathering refers to collecting information about an entity for strategic use.

23
New cards

Which intelligence discipline involves collecting information from publicly available sources?

The intelligence discipline that involves collecting information from publicly available sources is called OSINT.

24
New cards

What is intelligence obtained from human sources called?

Intelligence obtained from human sources is called HUMINT.

25
New cards

What is intelligence derived from digital networks and cyberspace known as?

Intelligence derived from digital networks and cyberspace is known as CYBINT / DNINT.

26
New cards

What does e-health refer to?

E-health refers to the use of ICT to improve healthcare.

27
New cards

What is telemedicine defined as?

Telemedicine is defined as the delivery of healthcare at a distance using technology.

28
New cards

What does telehealth refer to?

Telehealth refers to the broad use of technology for healthcare services.

29
New cards

What is remote patient monitoring used for?

Remote patient monitoring is used for monitoring patients at home.

30
New cards

Which type of telemedicine is asynchronous?

The type of telemedicine that is asynchronous is called store-and-forward.

31
New cards

What does interactive telemedicine involve?

Interactive telemedicine involves real-time communication.

32
New cards

What is an advantage of telemedicine?

An advantage of telemedicine is convenience.

33
New cards

What does telemedicine help reduce?

Telemedicine helps reduce no-shows and cancellations.

34
New cards

What is a disadvantage of telemedicine?

A disadvantage of telemedicine includes technical training requirements.

35
New cards

What do licensing issues in telemedicine refer to?

Licensing issues in telemedicine refer to legal permission to practice across locations.

36
New cards

What can virtual therapy be conducted through?

Virtual therapy can be conducted through electronic devices.

37
New cards

What is virtual psychotherapy also known as?

Virtual psychotherapy is also known as telepsychology.

38
New cards

What does virtual physical therapy provide?

Virtual physical therapy provides online or phone-based treatment.

39
New cards

What is a benefit of virtual therapy?

A benefit of virtual therapy is increased access to care.

40
New cards

What is a disadvantage of virtual therapy?

A disadvantage of virtual therapy includes data concerns.

41
New cards

What does hacking refer to?

Hacking refers to exploiting system weaknesses.

42
New cards

What is cracking?

Cracking is breaking into systems illegally.

43
New cards

Which hacker type is ethical?

The ethical hacker type is called white hat.

44
New cards

What are black hat hackers known for?

Black hat hackers are known for illegal activities.

45
New cards

Which tool scans systems for weaknesses?

A vulnerability scanner is a tool that scans systems for weaknesses.

46
New cards

What is password cracking used for?

Password cracking is used to guess or break passwords.

47
New cards

What are packet sniffers used to do?

Packet sniffers are used to capture network data.

48
New cards

What is a Trojan horse?

A Trojan horse is malicious software disguised as legitimate.

49
New cards

What are keyloggers used for?

Keyloggers are used to record keystrokes.

50
New cards

What does spamming refer to?

Spamming refers to sending unsolicited bulk messages.