Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Lesson 8 Protecting yourself Online

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Term
Definition
• SPAM   avoiding o Avoid adding yourself to unwanted mailing lists o Conduct online transactions through secure Web sites o Do not assume that only the intended recipient will read your messages o Be selective when posting information to newsgroups  
🗑
• Cookie types:   o persistent o session o first-party o third-party o You can control when and from whom cookies are accepted by specifying the level of privacy you want to maintain o You can view the file content of cookies to see information about the Web site  
🗑
• You can configure your browser’s security settings to accept, reject or prompt before accepting:   o ActiveX controls o JavaScript  
🗑
• Authentication   – the process of verifying the identity of a user who logs on to a system, or the integrity of transmitted data  
🗑
 Anonymous logon   – no user name or password are required, and authentication is handled transparently by the browser and server  
🗑
 Basic authentication   – a user name and password are required, and that information is sent as plain text  
🗑
 Symmetric (private-key) encryption   – The same key is used to encrypt and decrypt messages  
🗑
 Asymmetric (public-key) encryption   – Two keys are used to encrypt and decrypt messages: a public key and a private key  
🗑
 Hash (one-way) encryption   – Uses hashes to verify the integrity of transmitted messages  
🗑
 Digital certificates   – you must have the proper digital certificate to gain access  User names and passwords – used to log on to private and public networks, including the Internet  
🗑
 Digital signatures   – electronic signatures that verify the identity of the message sender  
🗑
 Non-repudiation   – digital signatures prove that a transaction or transmission took place; neither the sender nor the receiver can later deny the action  
🗑
• Encryption   – the process of converting data into an unreadable form of text  
🗑
• Decryption   the process of converting the encrypted data back to its original form  
🗑
• Key   a mathematical algorithm  
🗑
• Secure Sockets Layer (SSL)   – a protocol for secure exchanges  
🗑
• Various protocols in the TCP/IP suite can be made secure by running them over SSL/TLS, including:   o HTTPS o S/FTP o IMAPS o POP3S  
🗑
o Virus   – damages computers and networks, often alters files to damage or destroy data  
🗑
o Worm   – resides in active memory and replicates itself until an entire disk is full  
🗑
o Trojan   – appears to be harmless (such as a computer game) but produces harmful results o Illicit server – installs hidden services on systems  
🗑
 Client code   – allows remote access to a computer by an attacker  
🗑
 Server code   – infects destination computer and enables the attacker to control it  
🗑
• Corporate IT departments are often the first line of defense against viruses o Common ways to contract viruses:    Receive infected disc/drive from colleague or friend  Download infected file  Download illicit server attachment  
🗑
• Common ways to protect against viruses:   o Do not open e-mail or attachments from unknown senders o Configure browser and e-mail security to highest levels o Use anti-virus software o Keep anti-virus software current o Stay informed about the latest virus threats o Make backup copies o  
🗑
• If you receive an attachment you do not recognize:   o Do not open the attachment o Contact the sender to determine whether the attachment is legitimate o If you cannot contact the sender, delete the attachment from the message o Delete the attachment from the Deleted Items folder  
🗑
• If you suspect a virus attack:   o Use anti-virus software to remove the virus o If you cannot launch anti-virus software, reboot from a known clean system disk, then launch the anti-virus software o Remove virus from all disks, files and programs o If damage is too extensive, refo  
🗑
• Spyware   – an application secretly placed on a user’s system to covertly gather information and relay it to outside parties, usually for advertising purposes  
🗑
o Cookies are not spyware because:    The user is aware of their presence  The user has the option to disable outside access to cookie information  Use spyware detection applications to detect and eliminate spyware  
🗑
• Update   – a software upgrade that permanently fixes known bugs and improves software performance  
🗑
• Patch   – a temporary bug fix  
🗑
• Virus update   – files of virus signature profiles you use to keep your anti-virus software current  
🗑
• Typosquatting   – registering a domain name similar to a high-volume site hoping to receive traffic from users seeking the high-volume site who mistakenly enter an incorrect URL in the browser  
🗑
• Firewall   – a collection of hardware, software and corporate policies that prevents unauthorized access to or from private networks  
🗑
o Use firewalls to:    Prevent unauthorized Internet users from accessing private networks  Retain control of proprietary information  Prevent unauthorized export of proprietary information  Firewalls may prevent access to external e-mail providers or external server  
🗑
• Licensing   o To license copyright-protected material, you must obtain permission from the author  
🗑
• Trademarks   o To register a trademark, you must contact the appropriate agency in your home country  
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: spearaylall
Popular ACT sets