Presentation is loading. Please wait.

Presentation is loading. Please wait.

Cybersecurity Test Review Introduction to Digital Technology.

Similar presentations


Presentation on theme: "Cybersecurity Test Review Introduction to Digital Technology."— Presentation transcript:

1 Cybersecurity Test Review Introduction to Digital Technology

2 Cybersecurity Malware: Software designed specifically to disrupt or damage a system Virus: A program or piece of code that attacks a computer or network through contaminated data

3 Cybersecurity Trojan: A destructive program that masquerades as a harmless application Spyware: Software that secretly gathers information through the user’s Internet connection without his or her knowledge

4 Cybersecurity Adware: Software that is given to the user with advertisements hidden in the application Phishing: An email that claims to be a legitimate enterprise in an attempt to scam the user into surrendering private information to be used for identity theft

5 Cybersecurity Identity theft: Obtaining personal information about someone else illegally Antivirus software: Computer programs that can block, detect and remove viruses and other malware

6 Cybersecurity Encryption: The process of using codes to make readable information unreadable Spam: unsolicited emails sent to many addresses

7 Cybersecurity Describe the Nigerian email scam. Involves offering you a share in a large sum of money on thecondition that you help them transfer it out of their country

8 Cybersecurity List 4 tips on how you can avoid becoming a victim of identity theft. Shop only secure sites Protect your personal info Check your credit report Protect PINs and passwords Use an alternate identity for web surfing Use cash or credit

9 Cybersecurity Why is it important to use software that is updated automatically? The bad guys constantly develop new ways to attack your computer.

10 Cybersecurity Why is it important to back up your files to an external location? No system is completely secure. If you back up your files to an external location, if your computer is compromised, you'll still have access to your drive.

11 Cybersecurity How can downloading apps compromise your computer or electronic device’s security? Downloading may give developers access to personal information that's not related to the purpose of the app. The developers may share the information they collect with marketers and other companies.

12 Cybersecurity How does a captcha work? You have to type in the distorted letters and numbers as a security measure. This is difficult to impossible for a computer to do. The test helps identify which users are real human beings and which ones are computer programs.

13 Cybersecurity Why are newer cars, but not older cars, vulnerable to hacking? Modern cars are highly dependent on computers. Computers control many parts of new cars.

14 Cybersecurity Name four parts of a car that are controlled by a computer. Engine Lights BrakesPhone systems SteeringGPS Door locks

15 Cybersecurity List 2 tips on how to keep a “clean machine”. Latest security software Latest web browser Latest operating system When in doubt, throw it out Plug and scan devices such as flash drives

16 Cybersecurity How can you protect personal information on your phone? Keep security software current Protect all devices that connect to the Internet Use strong passwords to lock your phone Think before you app Learn how to disable the geotagging feature on your phone Only give your number out to people you can trust

17 Cybersecurity What happens to the data that is “harvested” by botnets? Criminals use it for identity theft, credit card fraud, spamming, website attacks and malware distribution


Download ppt "Cybersecurity Test Review Introduction to Digital Technology."

Similar presentations


Ads by Google