Week 12 Protecting Digital Data and Devices

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/15

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

16 Terms

1
New cards

What is cybercrime?

Any criminal action perpetrated primarily through the use of a computer.

2
New cards

What is identity theft?

Occurs when a thief steals personal information to run up debt in your name.

3
New cards

What are the types of hackers?

White-hat (ethical), black-hat (malicious), and grey-hat (flaunts expertise).

4
New cards

What is a denial-of-service attack?

An attack denying users access to a computer system by flooding it with requests.

5
New cards

What is a Trojan horse?

A program that appears useful but runs malicious activities in the background.

6
New cards

What are computer viruses used for?

To replicate themselves and copy code to as many other files as possible.

7
New cards

What is anti-spyware software?

A program that detects unwanted programs and allows users to delete them.

8
New cards

What is phishing?

A technique used to lure internet users into revealing personal information.

9
New cards

What are the main functions of antivirus software?

Detection, stopping execution of viruses, quarantining, and preventing future infections.

10
New cards

What are cookies?

Small text files stored by websites to provide information about browsing habits.

11
New cards

What are the guidelines to create strong passwords?

At least 14 characters long, mix of letters and symbols, and changed regularly.

12
New cards

How does a firewall protect computers?

By blocking access to logical ports and keeping network addresses secure.

13
New cards

What are the three primary forms of malware?

Adware, spyware, and viruses.

14
New cards

What should be done to protect computers from power surges?

Use surge protectors and replace them every two to three years.

15
New cards

What is the purpose of a backup?

To create copies of files to replace originals if they are lost or damaged.

16
New cards

What is scareware?

Malware that convinces users their computer is infected, prompting a purchase of fake removal tools.