CYBER SECURITY & ETHICS TEST (Plz Plz)

¡Supera tus tareas y exámenes ahora con Quizwiz!

Name the three categories included with digital citizenship

Connect Protect Respect

Morse Code

Different combinations of dots and dashes that represent each letter of the alphabet

What is usually used for secure online communication?

Public-Key Cryptography

Why do hackers hack?

To make discoveries, Protect Information, steal information of money, or even expose corruption

What is a network?

a group of connected computers and devices

Baconian Cipher

A chart explaining how to translate the made up language of Baconian which consists of "A"s & "B"s

Which one of the following statement is a NOT hack? A) Using a bicycle to power a computer B) Stealing an unlocked bicycle C) Creating a kinetic bicycle sculpture D) Building a working bicycle out of discarded umbrellas

B) Stealing an unlocked bicycle

Digital Footprint

Digital footprint is the traces you leave behind online Ex: History, Cookies, and IP

What are the dots and lines in Morse code called?

Dits & Dahs

What did the identity-theft crime ring do with "Tim's" photo?

Figure out his address

What 3 groups exploit cyber vulnerabilities for their gain?

Government, Criminals, and Hacktivist

How can you tell if a website encrypts its traffic?

Look for the lock symbol in a URL

Cyber Security

Measures taken to protect a computer or computer system against unauthorized access or attack

What can you trust to be 100% secure all the time?

NOTHING

Encryption

Process of converting readable data into unreadable characters to prevent unauthorized access.

Intellectual Property

Property derived from the work of human intellect. Intellectual property laws cover a wide range of property created by artists, authors, inventors, and musician, and protect copyrights, patents, trademarks, and trade secrets.

Digital Literacy

The ability to use information found online in a useful manner

Why are cyber vulnerabilities unlikely to ever go away?

They are side effects of the freedom and ease of communicating online

Pigpen Cipher

a geometric simple substitution cipher, which exchanges letters for symbols which are fragments of a grid

Acceptable Use Policy

a policy that a user must agree to follow in order to be provided access to a network or to the internet

Cookies

small computer programs left behind on your computer when you visit a website

e-commerce

the buying and selling of goods over the internet

Cyber Bullying

the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.

Public Key Cryptography

uses two keys: A public key the sender uses to create encrypted messages, and a mathematically-related private key that the receiver can use to decrypt messages encrypted by that public key.


Conjuntos de estudio relacionados

Exam 2 Endocrine, EXAM 2 Prep U Chapter 50, Exam 2 Endocrine CH 52

View Set

Chapter 16: Adverse Effects of Blood Transfusion

View Set

Ch.7 MGMT 495: Business Strategy (Innovation and Entrepreneurship)

View Set