Final Exam Review

0.0(0)
studied byStudied by 0 people
0.0(0)
linked notesView linked note
full-widthCall with Kai
GameKnowt Play
New
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/64

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

65 Terms

1
New cards

What is contextual integrity?

A privacy framework focusing on appropriate information flow based on norms of specific contexts.

2
New cards

Name the four key elements of contextual integrity.

Contexts, actors, attributes, and transmission principles.

3
New cards

What are transmission principles in contextual integrity?

Rules governing how information should flow between parties (e.g., confidentiality).

4
New cards

Give an example of a context where privacy expectations differ.

Workplace monitoring versus private home activities.

5
New cards

What role do actors play in contextual integrity?

They are the participants involved in the information exchange (e.g., sender, receiver).

6
New cards

How does contextual integrity address digital privacy?

It evaluates how new technologies disrupt traditional information norms.

7
New cards

What is a privacy violation under contextual integrity?

Sharing health records without consent outside the healthcare context.

8
New cards

Why is contextual integrity important for designing privacy-preserving systems?

It ensures systems respect existing norms and user expectations.

9
New cards

What is the first step in applying contextual integrity to a privacy issue?

Identifying the relevant context and its norms.

10
New cards

How does contextual integrity differ from traditional privacy approaches?

It focuses on context-specific norms rather than universal rules.

11
New cards

What is an example of a transmission principle in healthcare?

Maintaining confidentiality between doctor and patient.

12
New cards

Can contextual integrity be violated unintentionally? How?

Yes, through ignorance of context-specific norms, such as over-sharing on social media.

13
New cards

How does contextual integrity guide policy-making?

By ensuring laws respect the norms of specific contexts.

14
New cards

What is the impact of social media on contextual integrity?

It blurs traditional contexts, leading to privacy confusion.

15
New cards

Why is contextual integrity relevant in the age of big data?

It helps evaluate ethical information use in large-scale data analytics.

16
New cards

What are folk models in security?

Simplified mental frameworks non-experts use to understand security threats.

17
New cards

How do folk models influence security behavior?

They shape how non-experts identify and respond to threats, often incorrectly.

18
New cards

What is a common folk model of email security?

Believing an email with a trusted sender name is always safe.

19
New cards

Contrast expert and non-expert approaches to security warnings.

Experts analyze technical details, while non-experts rely on surface cues.

20
New cards

What role does usability play in non-expert security tools?

It ensures tools align with non-expert mental models to improve adoption.

21
New cards

What is a key limitation of folk models in security?

Over-reliance on visible signs like padlocks, which attackers can spoof.

22
New cards

Why is it important to study folk models in cybersecurity?

To design more intuitive and effective security systems.

23
New cards

How do non-experts typically evaluate website security?

By looking for visual cues like HTTPS or familiar logos.

24
New cards

What’s an example of a mismatch between expert knowledge and folk models?

Believing antivirus software alone can prevent all cyberattacks.

25
New cards

How can folk models be leveraged in security training?

By using relatable analogies and scenarios to teach best practices.

26
New cards

How does culture influence folk models?

Different cultures may prioritize varying aspects of security, like privacy versus accessibility.

27
New cards

What is a folk model regarding password complexity?

Longer passwords with symbols are always secure (not true if reused).

28
New cards

How do experts view phishing compared to non-experts?

Experts recognize nuanced patterns, while non-experts rely on superficial trust cues.

29
New cards

What is a limitation of using only expert-designed security protocols?

They may be too complex or unintuitive for non-experts to follow.

30
New cards

How can security systems bridge the gap between expert advice and folk models?

By incorporating user-friendly features that reflect folk model expectations.

31
New cards

What is the main goal of usable authentication?

To balance security with ease of use for users.

32
New cards

What is password reuse?

Using the same password across multiple accounts, creating vulnerabilities.

33
New cards

Name three password alternatives.

Biometrics, hardware tokens, and password managers.

34
New cards

Why are biometrics considered an improvement over passwords?

They are harder to replicate and don’t require memory.

35
New cards

What are two-factor authentication (2FA) methods?

A combination of passwords and secondary factors like SMS codes.

36
New cards

How do password managers enhance security?

By generating and storing unique, complex passwords for every account.

37
New cards

What is a challenge of using biometrics?

Potential for theft or misuse of biometric data.

38
New cards

How do authentication systems improve usability?

By reducing cognitive load, such as with single sign-on (SSO).

39
New cards

Why is password expiration problematic?

It encourages weak, predictable password choices.

40
New cards

What is the main drawback of relying solely on passwords?

They are prone to theft and difficult to manage securely.

41
New cards

What is the benefit of multi-factor authentication (MFA)?

It provides an additional layer of security beyond passwords.

42
New cards

What usability issues arise from frequent password changes?

Increased frustration and likelihood of poor practices like writing down passwords.

43
New cards

How does single sign-on (SSO) address usability?

It allows users to access multiple services with one set of credentials.

44
New cards

What is the role of user education in authentication?

To promote the use of secure methods and avoid risky behaviors like password reuse.

45
New cards

Why is device-based authentication growing in popularity?

It integrates seamlessly with smartphones and wearable tech for ease and security.

46
New cards

What is phishing?

A cyberattack that uses deception to steal sensitive information.

47
New cards

Name three common phishing methods.

Email phishing, spear-phishing, and SMiShing.

48
New cards

What makes phishing attacks effective?

Exploitation of human factors like urgency, authority, and trust.

49
New cards

What is spear-phishing?

A targeted phishing attack personalized to a specific individual.

50
New cards

How does vishing differ from traditional phishing?

It uses phone calls or voice messages instead of emails.

51
New cards

Name a human factor that increases phishing susceptibility.

Complacency or lack of awareness.

52
New cards

What is the role of training in phishing defense?

To teach users to recognize and avoid phishing attempts.

53
New cards

Name two phishing awareness tools.

PhishGuru and Anti-Phishing Phil.

54
New cards

What is the Phish Scale?

A framework to evaluate the difficulty of detecting phishing emails.

55
New cards

Why are game-based training tools effective against phishing?

They engage users interactively, improving retention of key concepts.

56
New cards

What is SMiShing?

Phishing via SMS or instant messaging.

57
New cards

How can phishing websites mimic legitimate ones?

By using similar domain names and visual design.

58
New cards

What is a phishing hook?

A tactic like a fake urgency or reward to lure victims.

59
New cards

What is pharming?

Redirecting users to fraudulent websites without their knowledge.

60
New cards

How do attackers personalize spear-phishing emails?

By gathering details about the victim from social media or other sources.

61
New cards

What is a defensive measure against phishing?

Browser plugins that flag suspicious URLs.

62
New cards

Why do phishing simulations improve awareness?

They let users practice identifying and avoiding attacks in a safe environment.

63
New cards

What is the impact of urgency cues in phishing emails?

They pressure users into acting quickly, reducing critical thinking.

64
New cards

What human factor often leads to phishing success?

A lack of digital literacy or security knowledge.

65
New cards

How has phishing evolved during the COVID-19 pandemic?

Increased use of fear and urgency around health and financial issues.