1.3.1 Risks to information held on computers

1.3.1 Risks to information held on computers

Assessment

Flashcard

Computers

9th - 10th Grade

Hard

Created by

Glen West

FREE Resource

Student preview

quiz-placeholder

6 questions

Show all answers

1.

FLASHCARD QUESTION

Front

What is accidental damage in the context of computer information?

Back

Accidental damage refers to unintentional harm or loss of data, such as through hardware failure, human error, or natural disasters.

2.

FLASHCARD QUESTION

Front

What is unintended disclosure by incorrectly assigned access levels?

Back

Unintended disclosure occurs when sensitive information is accessed by unauthorized individuals due to improper access level settings.

3.

FLASHCARD QUESTION

Front

What are some types of malicious software?

Back

Malicious software includes viruses, worms, Trojan Horses, spyware, ransomware, DDoS attacks, and key logging.

4.

FLASHCARD QUESTION

Front

What is hacking and its types?

Back

Hacking involves unauthorized access to computer systems. Types include white hat (ethical), black hat (malicious), and grey hat (a mix of both).

5.

FLASHCARD QUESTION

Front

What is social engineering in the context of computer security?

Back

Social engineering is the manipulation of people into divulging confidential information, often through deception.

6.

FLASHCARD QUESTION

Front

What are emerging threats in computer security?

Back

Emerging threats refer to new and evolving risks to computer security, which can include advanced persistent threats, zero-day vulnerabilities, and other novel attack vectors.