cybersecurity test review introduction to digital technology

17
Cybersecurity Test Review Introduction to Digital Technology

Upload: emil-sullivan

Post on 19-Jan-2018

216 views

Category:

Documents


0 download

DESCRIPTION

Cybersecurity Trojan: A destructive program that masquerades as a harmless application Spyware: Software that secretly gathers information through the user’s Internet connection without his or her knowledge

TRANSCRIPT

Page 1: Cybersecurity Test Review Introduction to Digital Technology

Cybersecurity Test Review

Introduction to Digital Technology

Page 2: Cybersecurity Test Review Introduction to Digital Technology

Cybersecurity

• Malware: Software designed specifically to disrupt or damage a system

• Virus: A program or piece of code that attacks a computer or network through contaminated data

Page 3: Cybersecurity Test Review Introduction to Digital Technology

Cybersecurity

• Trojan: A destructive program that masquerades as a harmless application

• Spyware: Software that secretly gathers information through the user’s Internet connection without his or her knowledge

Page 4: Cybersecurity Test Review Introduction to Digital Technology

Cybersecurity

• Adware: Software that is given to the user with advertisements hidden in the application

• Phishing: An email that claims to be a legitimate enterprise in an attempt to scam the user into surrendering private information to be used for identity theft

Page 5: Cybersecurity Test Review Introduction to Digital Technology

Cybersecurity

• Identity theft: Obtaining personal information about someone else illegally

• Antivirus software: Computer programs that can block, detect and remove viruses and other malware

Page 6: Cybersecurity Test Review Introduction to Digital Technology

Cybersecurity

• Encryption: The process of using codes to make readable information unreadable

• Spam: unsolicited emails sent to many addresses

Page 7: Cybersecurity Test Review Introduction to Digital Technology

Cybersecurity

• Describe the Nigerian email scam.• Involves offering you a share in a large sum

of money on the condition that you help them transfer it out of their country

Page 8: Cybersecurity Test Review Introduction to Digital Technology

Cybersecurity• List 4 tips on how you can avoid becoming a victim of

identity theft.

• Shop only secure sites• Protect your personal info• Check your credit report• Protect PINs and passwords• Use an alternate identity for web surfing• Use cash or credit

Page 9: Cybersecurity Test Review Introduction to Digital Technology

Cybersecurity

• Why is it important to use software that is updated automatically?

• The bad guys constantly develop new ways to attack your computer.

Page 10: Cybersecurity Test Review Introduction to Digital Technology

Cybersecurity

• Why is it important to back up your files to an external location?

• No system is completely secure. If you back up your files to an external location, if your computer is compromised, you'll still have access to your drive.

Page 11: Cybersecurity Test Review Introduction to Digital Technology

Cybersecurity

How can downloading apps compromise your computer or electronic device’s security?

•Downloading may give developers access to personal information that's not related to the purpose of the app.

•The developers may share the information they collect with marketers and other companies.

Page 12: Cybersecurity Test Review Introduction to Digital Technology

Cybersecurity

How does a captcha work?•You have to type in the distorted letters and numbers as a security measure. This is difficult to impossible for a computer to do.

•The test helps identify which users are real human beings and which ones are computer programs.

Page 13: Cybersecurity Test Review Introduction to Digital Technology

Cybersecurity

• Why are newer cars, but not older cars, vulnerable to hacking?

• Modern cars are highly dependent on computers.

• Computers control many parts of new cars.

Page 14: Cybersecurity Test Review Introduction to Digital Technology

Cybersecurity

Name four parts of a car that are controlled by a computer.•Engine Lights•Brakes Phone systems•Steering GPS•Door locks

Page 15: Cybersecurity Test Review Introduction to Digital Technology

Cybersecurity

List 2 tips on how to keep a “clean machine”.•Latest security software•Latest web browser•Latest operating system•When in doubt, throw it out•Plug and scan devices such as flash drives

Page 16: Cybersecurity Test Review Introduction to Digital Technology

CybersecurityHow can you protect personal information on your phone?

•Keep security software current•Protect all devices that connect to the Internet•Use strong passwords to lock your phone•Think before you app•Learn how to disable the geotagging feature on your phone•Only give your number out to people you can trust

Page 17: Cybersecurity Test Review Introduction to Digital Technology

Cybersecurity

What happens to the data that is “harvested” by botnets?

•Criminals use it for identity theft, credit card fraud, spamming, website attacks and malware distribution