1/33
Flashcards about privacy concerns, computer security, and ethical issues in cybersecurity.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Privacy Concerns
The ability to control when, how, and whom our personal information is used.
Accuracy (Privacy Concern)
How accurate and correct is the recorded information?
Property (Privacy Concern)
Who owns the data?
Access (Privacy Concern)
Who has the right to access the data?
Information Broker / Data Broker
A business that collects personal data from various sources, processes it, and sells it to individuals or companies.
Security
Safeguarding data, hardware, and software against misuse and harm from natural catastrophes, sabotage, and invasions.
Hacker
Someone who creates or improves programs and shares them for vulnerability checking, or enters networks for fun.
Cracker
Someone who creates and shares programs designed to gain unauthorized access or disrupt networks.
Cookies, Web browsing history, Rogue Wi-Fi hotspots, Malware, DoS/DDoS attacks, Internet Scam, Social Networking Risks, Other Hazards
Cybersecurity threats
Cookies
Text/data files that websites use to keep track of user movements and preferences.
First-party Cookies
Cookies created by the website the user is currently visiting.
Third-party Cookies (Tracking cookies)
Cookies generated by an advertising company affiliated with the website you're visiting; used for tracking.
Web Browsing History
A list of recently visited websites; can be used for phishing attacks.
Rogue Wi-Fi Hotspot
An open hotspot setup by hackers to lure people into connecting to their network.
Malware
Malicious software designed to harm computer systems, networks, or users.
Virus, Worm, Trojan Horse, Botnets, Web Bugs, Adware, Ransomware, Rootkits
Types of malware
Virus
Malware that attach to legitimate programs and replicate when the infected program runs.
Worm
Malware that replicates and spreads across a network independently, without needing to attach to files.
Trojan Horse
Malware that disguises itself as legitimate software but creates a backdoor for attackers.
Botnets
Networks of infected computers controlled remotely by a single entity.
Web Bugs
HTML code hidden on a web page or email to monitor who is viewing it.
Adware
Malware that displays unwanted advertisements on a user's computer.
Ransomware
Malware that encrypts files and demands a ransom for decryption keys.
Rootkits
Malware designed to conceal malicious software and processes within a compromised system.
Denial-of-Service (DoS) Attack
An attack that floods a machine or network with traffic to make it inaccessible to its intended users.
Distributed Denial-of-Service (DDoS) Attack
A DoS attack that uses a large number of computers (a botnet) to overwhelm the target with traffic.
Internet Scam
Using Internet services or software to cheat or take advantage of a victim, typically for financial gain.
Phishing
The most common method of internet scam, posing as a legitimate institution to trick individuals into providing confidential data.
Social Networking Risks
The more information you post, the more vulnerable you may become.
Natural Hazards, Technological Failures, Human Errors
Hazards
Access Restrictions, Data Loss Prevention, Encryption
Security Measures
Access Restrictions
Using strong passwords and biometric technologies.
Data Loss Prevention
Careful screening of potential employees, frequent data backups, auditing of data and programs, and safeguarding passwords.
Encryption
Converting data into a specific set of codes or unrecognized form with the only authorized party that can view and have access to the encryption.