Module 6 (Security & Safety)
Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer?
A trojan
How is a worm different from a Trojan?
A worm spreads through a network, whereas a Trojan hides inside another program.
How can you protect your information when using social media?
Accept friend requests from people you want to be friends with
Which term refers to the science that specifies the design and arrangement of items you can use so you interact with the items efficiently and safely?
Ergonomics
Marcus recently had his cell phone stolen. All of the following are security features that should help him locate his stolen phone EXCEPT which one?
He can use remote wiping to retrace the thief's steps
What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email from a person masquerading as an employee from your bank?
Phishing
With more and more people using technology, what physical health diagnosis is on the rise?
Repetitive strain injury
You can monitor and protect your financial data in all of the following ways EXCEPT
Requesting a credit report and and freezing your credit
What is a digital certificate?
Technology used to verify a user's identity
How could an online attacker use your online profile to gather information about you to steal your identity?
Use your posts to figure out answers to possible security questions