Privacy Concerns and Computer Security

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/33

flashcard set

Earn XP

Description and Tags

Flashcards about privacy concerns, computer security, and ethical issues in cybersecurity.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

34 Terms

1
New cards

Privacy Concerns

The ability to control when, how, and whom our personal information is used.

2
New cards

Accuracy (Privacy Concern)

How accurate and correct is the recorded information?

3
New cards

Property (Privacy Concern)

Who owns the data?

4
New cards

Access (Privacy Concern)

Who has the right to access the data?

5
New cards

Information Broker / Data Broker

A business that collects personal data from various sources, processes it, and sells it to individuals or companies.

6
New cards

Security

Safeguarding data, hardware, and software against misuse and harm from natural catastrophes, sabotage, and invasions.

7
New cards

Hacker

Someone who creates or improves programs and shares them for vulnerability checking, or enters networks for fun.

8
New cards

Cracker

Someone who creates and shares programs designed to gain unauthorized access or disrupt networks.

9
New cards

Cookies, Web browsing history, Rogue Wi-Fi hotspots, Malware, DoS/DDoS attacks, Internet Scam, Social Networking Risks, Other Hazards

Cybersecurity threats

10
New cards

Cookies

Text/data files that websites use to keep track of user movements and preferences.

11
New cards

First-party Cookies

Cookies created by the website the user is currently visiting.

12
New cards

Third-party Cookies (Tracking cookies)

Cookies generated by an advertising company affiliated with the website you're visiting; used for tracking.

13
New cards

Web Browsing History

A list of recently visited websites; can be used for phishing attacks.

14
New cards

Rogue Wi-Fi Hotspot

An open hotspot setup by hackers to lure people into connecting to their network.

15
New cards

Malware

Malicious software designed to harm computer systems, networks, or users.

16
New cards

Virus, Worm, Trojan Horse, Botnets, Web Bugs, Adware, Ransomware, Rootkits

Types of malware

17
New cards

Virus

Malware that attach to legitimate programs and replicate when the infected program runs.

18
New cards

Worm

Malware that replicates and spreads across a network independently, without needing to attach to files.

19
New cards

Trojan Horse

Malware that disguises itself as legitimate software but creates a backdoor for attackers.

20
New cards

Botnets

Networks of infected computers controlled remotely by a single entity.

21
New cards

Web Bugs

HTML code hidden on a web page or email to monitor who is viewing it.

22
New cards

Adware

Malware that displays unwanted advertisements on a user's computer.

23
New cards

Ransomware

Malware that encrypts files and demands a ransom for decryption keys.

24
New cards

Rootkits

Malware designed to conceal malicious software and processes within a compromised system.

25
New cards

Denial-of-Service (DoS) Attack

An attack that floods a machine or network with traffic to make it inaccessible to its intended users.

26
New cards

Distributed Denial-of-Service (DDoS) Attack

A DoS attack that uses a large number of computers (a botnet) to overwhelm the target with traffic.

27
New cards

Internet Scam

Using Internet services or software to cheat or take advantage of a victim, typically for financial gain.

28
New cards

Phishing

The most common method of internet scam, posing as a legitimate institution to trick individuals into providing confidential data.

29
New cards

Social Networking Risks

The more information you post, the more vulnerable you may become.

30
New cards

Natural Hazards, Technological Failures, Human Errors

Hazards

31
New cards

Access Restrictions, Data Loss Prevention, Encryption

Security Measures

32
New cards

Access Restrictions

Using strong passwords and biometric technologies.

33
New cards

Data Loss Prevention

Careful screening of potential employees, frequent data backups, auditing of data and programs, and safeguarding passwords.

34
New cards

Encryption

Converting data into a specific set of codes or unrecognized form with the only authorized party that can view and have access to the encryption.