cybersecurity test review introduction to digital technology
DESCRIPTION
Cybersecurity Trojan: A destructive program that masquerades as a harmless application Spyware: Software that secretly gathers information through the user’s Internet connection without his or her knowledgeTRANSCRIPT
Cybersecurity Test Review
Introduction to Digital Technology
Cybersecurity
• Malware: Software designed specifically to disrupt or damage a system
• Virus: A program or piece of code that attacks a computer or network through contaminated data
Cybersecurity
• Trojan: A destructive program that masquerades as a harmless application
• Spyware: Software that secretly gathers information through the user’s Internet connection without his or her knowledge
Cybersecurity
• Adware: Software that is given to the user with advertisements hidden in the application
• Phishing: An email that claims to be a legitimate enterprise in an attempt to scam the user into surrendering private information to be used for identity theft
Cybersecurity
• Identity theft: Obtaining personal information about someone else illegally
• Antivirus software: Computer programs that can block, detect and remove viruses and other malware
Cybersecurity
• Encryption: The process of using codes to make readable information unreadable
• Spam: unsolicited emails sent to many addresses
Cybersecurity
• Describe the Nigerian email scam.• Involves offering you a share in a large sum
of money on the condition that you help them transfer it out of their country
Cybersecurity• List 4 tips on how you can avoid becoming a victim of
identity theft.
• Shop only secure sites• Protect your personal info• Check your credit report• Protect PINs and passwords• Use an alternate identity for web surfing• Use cash or credit
Cybersecurity
• Why is it important to use software that is updated automatically?
• The bad guys constantly develop new ways to attack your computer.
Cybersecurity
• Why is it important to back up your files to an external location?
• No system is completely secure. If you back up your files to an external location, if your computer is compromised, you'll still have access to your drive.
Cybersecurity
How can downloading apps compromise your computer or electronic device’s security?
•Downloading may give developers access to personal information that's not related to the purpose of the app.
•The developers may share the information they collect with marketers and other companies.
Cybersecurity
How does a captcha work?•You have to type in the distorted letters and numbers as a security measure. This is difficult to impossible for a computer to do.
•The test helps identify which users are real human beings and which ones are computer programs.
Cybersecurity
• Why are newer cars, but not older cars, vulnerable to hacking?
• Modern cars are highly dependent on computers.
• Computers control many parts of new cars.
Cybersecurity
Name four parts of a car that are controlled by a computer.•Engine Lights•Brakes Phone systems•Steering GPS•Door locks
Cybersecurity
List 2 tips on how to keep a “clean machine”.•Latest security software•Latest web browser•Latest operating system•When in doubt, throw it out•Plug and scan devices such as flash drives
CybersecurityHow can you protect personal information on your phone?
•Keep security software current•Protect all devices that connect to the Internet•Use strong passwords to lock your phone•Think before you app•Learn how to disable the geotagging feature on your phone•Only give your number out to people you can trust
Cybersecurity
What happens to the data that is “harvested” by botnets?
•Criminals use it for identity theft, credit card fraud, spamming, website attacks and malware distribution