Intro. to Computers Module 6
Describe how Encryption works
The process of "scrambling" information in such a way that it cannot be read unless the use possesses the "key" to unlock it back to a readable format (decryption)
Identify how to protect personal info collected by legitimate institutions
•Give only necessary information when completing an online form or a warranty or rebate card •Review the information that online sites have stored about you •Request to be removed from mailing lists •Create another email account to use when a merchant or website requires an address •Don not use your social media account login information to log in to another site
Identify in regards to privacy, which is a best practice
•Shred financial documents and paperwork that contain personal information •Do not carry a Social Security number in a wallet or write it on a check •Do not provide personal information either over the phone or through an email message •Keep personal information in a secure location in a home or apartment •Be cautious about what information is posted on social networking sites and who can view your information. Show "limited friends" a reduced version of profile •Keep only last three months of most recent financial statements and shred old documents. For paper documents that must be retained, use a scanner to create a PDF with a strong password •Give cautions consideration before giving permission to a website or app request to collect data •Use common sense
Identify what a DIGITAL CERTIFICATE is
A technology used to verify a user's identity and key that has been "signed" by a trusted third party
Identify how a hacker can execute malware using a script
An add-on might allow your computer to download a "script" or series of instructions that commands the browser to perform specific actions
Identify how which browser security setting to allows and which to not
Cookies, scripting, plug-ins, pop-ups, clear browsing data, plug-in validation
Identify the term data backup
Copying files from a computer's hard drive that are then stored in a remote location
True or False: "To prevent a laptop from being stolen, you can use a surge protector."
False
True or False: "To protect your information and to help you to remember passwords, use your social media account login information to log into another site."
False
True or False: A Trojan is a malicious program that uses a computer network to replicate.
False
Identify what it is called, when an attacker convinces you to enter in personal info at a fake website after receiving an email from a person pretending to be a bank employee
Identify Theft
Identify situation in which a digital certificate is useful
Make it possible to verify the identity of a user and the user's key to prevent an attack from someone impersonating the user
Identify how the discarding of old computer in a landfill have an effect on the environment
Results in a large amount of e-waste, the toxic metals may eventually contaminate the ground and water supply *gold, palladium, platinum, copper, mercury, and lead
Identify how to protect a computer from electrical surges
Surge protector
Identify to what technology can lead to EXCEPT
Technology addiction •Sedentary lifestyle result in too little time for physical activity •Psychological development such as poor self-confidence, anxiety, depression, lower emotional stability, and even lower life satisfaction •Social interaction may hinder social skill development or even cause social withdrawal
Identify an example of cyberbullying
The use of technology to stalk another person through email, text messages, phone calls, and other forms of communication
Identify how the system of biometrics is used in a hospital setting
Uses the characteristics of your face, hands, voice, or eyes to authenticate you
Differentiate between a worm and a trojan
Worm is malicious program that uses computer network to replicate, network viruses Trojan is malware that hides inside another program, often one downloaded from the web
True or false: "Social networking sites have a history of providing tight security and giving users a clear understanding of how security features work."
false
Identify what would NOT BE included as an attack risk on a Wi-Fi Network
•Reading wireless transmission •Viewing or stealing computer data •Injecting malware •Downloading harmful content