Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Final Exam

Cyber Security Final Exam

QuestionAnswer
Rules or manners for interacting courteously with others online (such as not typing a message in all capital letters, which is equivalent to shouting). Netiquette
PII is any information specific to an individual. Personally Identifiable Information (PII)
Willful and repeated harm inflicted through the medium of electronic text, typically through e-mails or on websites (e.g., blogs, social networking sites). Cyberbullies/cyberbullying
Methods individuals use to track, lure, or harass another person online. Cyberstalking
Web sites on the worldwide web with hazard conditions to cyber safety. Risk Sites
An electronic mail message sent from one computer or mobile device to another computer or mobile device. Electronic mail (e-mail)
A secret word or number that must be used to gain access to an online service or to modify software, such as a parental control. Password
The process of protecting a system and network against unintended or malicious changes or deletion of information Cybersecurity
The study of ethics pertaining to computers, covering we use them how we use them; this can affect individuals and society. Cyber Ethics
The act of circumventing or breaking past security boundaries. Hacking
A person who engages in hacking. Hacker
ethical and law-abiding. White-hat hacker
operates outside the law. Black-hat hacker
The avenue or path hacker uses to commit the attack. Attack vector
A malicious software code that is unleashed and attempts to perform its destructive content. Virus
A attempt to steal, damage, or destroy data or computer system. Cyberattack
Confidentiality Integrity Availability Are the three underlying principles of data protection. CIA triad
The condition of being private or secret Confidentiality
Having important information in the state of being complete or uncorrupted Integrity
Having access to information when you need it is known as. Availability
This term refers to the weakness of an Asset that can be Exploited by one or more attackers Vulnerability
Any event that has the potential to bring harm to an organization or individual. Threat
The potential or loss or damage when a threat exploits a vulnerability Risk
A computer code intentionally written to cause some form of harm. Malware
fraudulent attempt to obtain sensitive information or data by disguising oneself as a trustworthy entity in an electronic communication Phishing
a third party trying to gain access to your systems by cracking a user’s password. Password Attack
A cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to the Internet. Denial-of-Service Attack (DDoS)
a type of malware from cryptovirology that threatens to publish the victim’s data or perpetually block access to it unless a ransom is paid. Ransomware
What do we do with Ransomware? We don’t pay because the hacker may not give you the info you need to get your file back and may try to force you to pay more money.
Name 1 – 2 types of a cyber attack? DDOS, Virus, Phishing
This type of Password Attack has a third party trying to guess your password. Brute Force Password Attack
Examples of Confidentiality attacks Hacking Encrypted Data, Man in the middle attacks
Examples of Integrity attacks Remotely controlling zombie system, Maliciously accessing servers and forging records
Examples of Availability attacks DOS/DDoS Attacks, Flooding a server with too many requests
These two are a list common things you should NEVER do online. share your password, Posting anything online that you do not want public
What are the three key Goals of Security Measures in Cyber Security? Prevent ,Detect, and Recover from a problem.
Personal Skills used to communicate and work well with others is known as what? Soft Skills
In a few words define what is Risk sites? Web sites on the worldwide web with hazard conditions to cyber/online safety
True or False: The Purpose of Malware is found in its payload. True
Keylogger Technology that tracks a user’s keystrokes on the keyboard.
Social Engineering To Trick Someone into doing actions or giving up confidential information to hackers/people.
Cookies Small files saved on the computer for web browser and websites.
True or False: Trusted Sites Create Cookie Policy that States if the site uses them and how they are being used. True
Trojan Horse Malware hidden inside other Software that appears harmless.
True or False: Remote Access Trojan is a malware that allows the hacker to embed a backdoor to gain administrative control over someone computer. False
Compliance Following the rules or standards that has been established.
Computer Fraud and Abuse Act (CFAA) Deals with unauthorized access of computers.
Electronic Communication and Privacy Act (ECPA) Protects wire and electronic transmissions of data.
Sarbanes-Oxley Act (SOX) Prevents company executives from hiding or destroying electronic records from a minimum of five years.
Gramm-Leach-Bliley Act (GLBA) Ensures that financial businesses are protecting your private data.
Health Insurance Portability and Accounting Act (HIPAA) Protects Electronic Medical Records and Personal Health Information.
Which of the following below are key sign to watch out for when dealing with Phishing. Select all that apply Spoofed Email Address, All Caps, Asking your for your PII
What is the name of the Programing Language We use on replit.com? Python
True or False: 50% of websites online are safe. False No place is 100% safe online.
Dumpster Diving One who goes digging through trash for useful information.
Encryption Data protection technique that includes changing information from its original form to disguised or encoded format
Cipher A tool used to change normal text into something that is unreadable and then turn back into readable text.
Plaintext Refers to any text that can be read or written.
Ciphertext Encoded message
Virtual Machine Runs a Actual operating system of physical computer.
Created by: user-1759713
Popular CPS/CAP sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards