Cyber Security: Dangers of Free Downloads and Network Protocols

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/9

flashcard set

Earn XP

Description and Tags

Flashcards covering key concepts from the lecture on cybersecurity, focusing on the dangers of free downloads and essential networking protocols.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

10 Terms

1
New cards

What is a primary danger of downloading free applications from unknown sources?

They may contain embedded software that accesses your personal information.

2
New cards

What could happen if your computer is affected by ransomware?

Criminals may shut down your computer and delete all your files if you do not pay the ransom.

3
New cards

Why are unsecured networks at places like Starbucks potentially risky?

Hackers may set up fake networks to intercept personal data from unsuspecting users.

4
New cards

What does the port number 21 refer to?

File Transfer Protocol (FTP) which is used for transferring files.

5
New cards

What is the port number for Secure Shell (SSH)?

22, used for remote access and secure connections.

6
New cards

Which protocol is used to send emails and what is its port number?

Simple Mail Transfer Protocol (SMTP), port 25.

7
New cards

What port number is associated with Domain Name System (DNS)?

53, which translates domain names to IP addresses.

8
New cards

How can one identify a secure website?

By the presence of 'HTTPS' in the URL indicating that it is secure; it uses port 443.

9
New cards

What does HTTP stand for and what is its port number?

Hypertext Transfer Protocol, port number 80.

10
New cards

Why is it important to be aware of open ports?

To understand potential vulnerabilities and enforce better cybersecurity practices.