1/25
Finals Flashcard Deck
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
Goal Of Cybersecurity
Protect information, systems, and networks, from threats
PII
Social Security Numbers, full name, address, phone number, financial account numbers
Ransomware
Malware that locks of encrypts files until a ransom is paid
Phishing
Tricking users into giving sensitive information through fake emails, websites, or messages
Strong Passwords
Mix of uppercase, lowercase, numbers, and symbols. Avoid personal info or common words
Firewalls
Block unauthorized access to a network
Multi-Factor Authentification (MFA)
Requires two or more verification methods (password, code, fingerprint, etc.)
Password Storage
Safest method: use a password manager
Worms
Malware that self-replicates and spreads without user action
Social Engineering
Manipulating people into revealing confidential information
Principle of Least Privilege
Users should receive only the minimum access needed for their tasks
Suspicious Email Attachments
Delete or report unexpected attachments from unknown senders
Encryption
Converts data into unreadable form to protect it
DDoS Attack
Overwhelm a service with traffic to disrupt services
FERPA
Protects students' educational records
Digital Citizenship
Respecting privacy, behaving responsibly, and being kind online
Importance of backups
Protects against hardware failure, accidental deletion, and ransomware
Antivirus Software
Detects, prevents, and removes malware
Signs of a fraudulent website
Missing contact info, Strange or misspelled URLS
Trojan Malware
Appears legit but delivers harmful software once opened
Botnet Zombie
A computer controlled remotely as part of a network used for cyberattacks
Strongest Password Example
Complex and random: e.g., C!9v#A2m%7
Public Wi-Fi Safety
Use a VPN to encrypt your connection.
Security Analyst
Monitors networks for threats and suspicious activity
If Your Account Is Hacked
First step: Change your password immediately.
NIST
National Institute of Standards and Technology