Digital Security Final Exam

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/50

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

51 Terms

1
New cards

Digital Security Risk

Any event or action that could cause a loss or of damage to computer or mobile device hardware, software, data, information, or processing capability.

2
New cards

Computer Crime

Any illegal act involving the use of a computer or related devices

3
New cards

Cybercrime

An online or Internet-based illegal act

4
New cards

Hacker

Someone who accesses a computer or network illegally

5
New cards

Cracker

Access a computer or network illegally, but has the intent of destroying data, stealing information, or other malicious actions

6
New cards

Script Kiddie

Has the same intent as a cracker but does not have technical skills or knowledge

7
New cards

Cyberextortionist

Someone who demands payment to stop an attack on an organization's technology infrastructure

8
New cards

Cyberterrorist

Someone who uses the Internet or network to destroy or damage computers for political reasons

9
New cards

Information transmitted over networks

Has a higher degree of security risk than information kept on an organization's premises

10
New cards
  • Malwares

  • Botnets

  • Denial of service attacks

  • Back doors

  • Spoofing

Name the internet and network attacks that jeopardize security?

11
New cards

Malware

Consists of programs that act without a user's knowledge and deliberately alter the operations of computers and mobile devices

12
New cards

Malware

Short for Malicious Software

13
New cards

Botnet

A group of compromised computers or mobile devices connected to a network

14
New cards

Zombie

A compromised computer is also known as a what?

15
New cards

Denial of service attack (DoS attack)

Disrupts a computer access to Internet service

16
New cards

Distributed Denial of Service attack (DDoS)

Zombie army is used to attack computer networks

17
New cards

Back doors

Program or set of instructions in a /program that allow users to bypass security controls

18
New cards

Spoofing

Technique intruders use to make their network or Internet transmission appear legitimate

19
New cards
  1. IP Spoofing

  2. Email Spoofing

What are the two types of spoofing?

20
New cards

Firewall

Hardware and/or software that protects a network's resources from intrusion

21
New cards

Unauthorized access

The use of a computer or network without permission

22
New cards

Unauthorized use

The use of a computer or its data for unapproved or possibly illegal activities

23
New cards

Access Controls

Define who can access a computer, device, or network; when they can access it; and what actions can they take while accessing it

24
New cards

User Names and Passwords

Are unique combinations of characters that identifies one user

25
New cards

PIN (personal identification number)

Is a number password

26
New cards

Possessed Object

An item that you must poss in order to gain access to computer or facility

27
New cards

Biometric Device

Authenticates translating pers characteristic into digital code

28
New cards
  1. Finger Print reader

  2. Hand Geometry System

  3. Face Recognition System

  4. Voice Verification System

  5. Iris Recognition System

Name the five Biometric Devices

29
New cards

Two-step verification

Uses two separate methods, one after the next, to verify the identity of a user

30
New cards
  1. User Accounts

  2. ATM Machines

Name both two-step verification systems

31
New cards

Digital Forensics/Cyberforensics

The discovery, collection, and analysis of evidence found on computers and networks

32
New cards

Physical Stealing Software

A perpetrator physically steals the media that contains the software, or steals the hardware that contains the media that contains the software

33
New cards

Intentionally Erasing Software

A perpetrator erases the media that contains the software

34
New cards

Illegal Registration/Activation

A perpetrator illegally obtains registration numbers and/or activation codes

35
New cards

Illegal Copying

A perpetrator copies software from manufacturers

36
New cards

Software Piracy

The unauthorized and illegal duplication of copyrighted software

37
New cards

License Agreement

The right to use the software

38
New cards

Information Theft

Occurs when someone steals personal or confidential information

39
New cards

Encryption

The process of converting data that is readable by humans into encodable characters to prevent unauthorized access

40
New cards

Digital Signatures

Encrypted code that a person, website, or organization attaches to an electronic message to verify the identity of the message sender

41
New cards

Digital Certificate

Is a notice that guarantees a user or a website is legitimate. Website that uses encryption techniques to secure its data is known as a secure site

42
New cards

Technology Ethics

The moral guidelines that govern the use of computers, mobile devices, information systems, and related technologies

43
New cards

Intellectual Property

Refers to unique and original works such as ideas, inventions, art, writings, processes, company and product names, and logos

44
New cards

Intellectual Property Rights

Are the rights to which creators are entitled to their work

45
New cards

A Copyright

Protects any tangible form of expression

46
New cards

Digital rights management (DRM)

A strategy designed to prevent illegal distribution of movies, music, and other digital content

47
New cards

Green Computing

Involves reducing the electricity and environmental waste while using computers, mobile devices, and related technologies

48
New cards

Information Privacy

Refers to the right of individuals and companies to deny or restrict the collection, use, and dissemination of information about them

49
New cards

Cookies

Small text files that a web server stores on your computer

50
New cards
  • Allow for personalization

  • Store user names and/or passwords

  • Assist with online shopping

  • Track how often users visit a site

  • Target advertisements

Why do websites use cookies?

51
New cards

Social Engineering

Defined as gaining unauthorized access to or obtaining confidential information by taking advantage of the trusting human nature of some victims a the naivety of others