Week 12 Protecting Digital Data and Devices

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 15

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

16 Terms

1

What is cybercrime?

Any criminal action perpetrated primarily through the use of a computer.

New cards
2

What is identity theft?

Occurs when a thief steals personal information to run up debt in your name.

New cards
3

What are the types of hackers?

White-hat (ethical), black-hat (malicious), and grey-hat (flaunts expertise).

New cards
4

What is a denial-of-service attack?

An attack denying users access to a computer system by flooding it with requests.

New cards
5

What is a Trojan horse?

A program that appears useful but runs malicious activities in the background.

New cards
6

What are computer viruses used for?

To replicate themselves and copy code to as many other files as possible.

New cards
7

What is anti-spyware software?

A program that detects unwanted programs and allows users to delete them.

New cards
8

What is phishing?

A technique used to lure internet users into revealing personal information.

New cards
9

What are the main functions of antivirus software?

Detection, stopping execution of viruses, quarantining, and preventing future infections.

New cards
10

What are cookies?

Small text files stored by websites to provide information about browsing habits.

New cards
11

What are the guidelines to create strong passwords?

At least 14 characters long, mix of letters and symbols, and changed regularly.

New cards
12

How does a firewall protect computers?

By blocking access to logical ports and keeping network addresses secure.

New cards
13

What are the three primary forms of malware?

Adware, spyware, and viruses.

New cards
14

What should be done to protect computers from power surges?

Use surge protectors and replace them every two to three years.

New cards
15

What is the purpose of a backup?

To create copies of files to replace originals if they are lost or damaged.

New cards
16

What is scareware?

Malware that convinces users their computer is infected, prompting a purchase of fake removal tools.

New cards

Explore top notes

note Note
studied byStudied by 10 people
752 days ago
5.0(1)
note Note
studied byStudied by 8 people
909 days ago
5.0(1)
note Note
studied byStudied by 56 people
899 days ago
5.0(1)
note Note
studied byStudied by 30 people
974 days ago
4.0(1)
note Note
studied byStudied by 1114 people
680 days ago
4.0(6)
note Note
studied byStudied by 58 people
1065 days ago
5.0(1)
note Note
studied byStudied by 6 people
760 days ago
5.0(1)
note Note
studied byStudied by 139196 people
332 days ago
4.8(594)

Explore top flashcards

flashcards Flashcard (49)
studied byStudied by 111 people
543 days ago
4.8(4)
flashcards Flashcard (138)
studied byStudied by 201 people
870 days ago
5.0(4)
flashcards Flashcard (40)
studied byStudied by 21 people
554 days ago
5.0(2)
flashcards Flashcard (60)
studied byStudied by 7 people
15 days ago
5.0(1)
flashcards Flashcard (63)
studied byStudied by 3 people
739 days ago
5.0(1)
flashcards Flashcard (36)
studied byStudied by 30 people
550 days ago
5.0(4)
flashcards Flashcard (28)
studied byStudied by 2 people
729 days ago
5.0(1)
flashcards Flashcard (46)
studied byStudied by 232 people
69 days ago
5.0(1)
robot