















Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
CSCU(Certified Secure Computer User) V3 Course Overview Updated Exam Guide 2025/2026
Typology: Exams
1 / 23
This page cannot be seen from the preview
Don't miss anything!
Data - ansUnorganized facts that can be processed into meaningful information. Information - ansProcessed data conveying specific meaning, & of substantial value. Personal Data - ansMinor personal details that can lead to susceptibility to financial, emotional & physical damage. Organizational Data - ansInformation belonging to commercial entities. Commercial Data Breach - ansImpacts include financial value, market value, credibility, time loss, and costs. Natural Threats - ansNatural disasters / accidents that cannot be predicted or avoided. User Error - ansThe biggest threat to data, often due to ignorance or accidental lapses. Data Predators - ansIndividuals or entities that seek to exploit personal information of value in the digital age. Data Security - ansThe process of protecting information, & the infrastructure storing it, from unauthorized access / misuse. Malicious Programs - ansViruses, worms, & spyware that infect 90% of the devices that users connect to the Internet. Zombies - ansCompromised computers used to launch attacks. Physical Security - ansProtection against loss or theft of media such as laptops, data cards, and phones. Data Loss - ansPotential losses that can occur due to a data compromise. Backup - ansA solution for data loss that involves storing important items in a remote location. Corporate Espionage - ansData thefts that target weak links in cyber security chains. Social Engineering - ansA common method of attackers that involves befriending individuals to gain access to data. Awareness - ansRecommended practice to mitigate threats to data from oneself and others. CIA Triad - ansRefers to the principles of confidentiality, integrity, and availability in data security. Data Security Threats - ansIncludes natural threats, user error, and threats from others. Data Generation - ansThe process by which data is constantly created, including phone numbers, map locations, and transactions. Preparedness - ansThe act of preparing and preventing data loss through regular scheduling and backup. Legal Fees & Lawsuits - ansCosts associated with data breaches that can impact organizations. Remote Work Security - ansMeasures taken to secure data and communications while working remotely. Confidentiality of Data - ansConcept of being known / accessible to ONLY Authorized Users. Integrity - ansSecurity of Data. FUNCTION: ensuring info is accurate, complete, reliable, & is in its original form. Authenticity - ansThe truthfulness of the Origin of Data. FUNCTION: ensures claimed source of Data is actually original source and not tampered with since creation. Availability of Data - ansAuthorized user access at any point of time. FUNCTION: ensures once a user captures the Data, it must make it available when they request it.
Nonrepudiation - ansProcess ensuring the accuracy of the Sender & Receiver of a message. FUNCTION: ensures sender cannot deny having sent the message & the recipient cannot deny having received it. Financial Loss - ansSystems Unavailable - COSTLY (enterprise = Sensitive Data / Home = Bank/Credit card info). Depleted Resources - ansDrive space/memory/processor speed - PERFORMANCE latency. Identity Theft - ansProcess of stealing personal info w/ intent to use illegally. Identity Fraud - ansActual usage of stolen PII in illegal activities. Loss of Trust - ansBreach disguised as Trusted Entity - MALICIOUS SOFTWARE. Data Loss / Theft - ansPublic release - Organization / Individual damage (REPUTATION). Misuse of Computer Resources - ansHigher performance & Faster Internet = Reduced Security. Precaution - ansAction taken in advanced to protect the system against Threats / Dangers. Precautionary Measures - ansInstalling & maintaining Antivirus program, Firewall program, Strong Passwords, File/App DLs from ONLY Known & Trusted Sources, Virus Scans regularly, System Updates regularly. Maintenance - ansActions supporting precautionary measures & securing devices. FUNCTION: check the efficacy of the precautionary measures & Update when required. Sys. Maintenance Measures - ansBackup Copies, Malware mgmt., Updating of firewall & antivirus programs regularly, Sufficient Free Space & Memory, Regularly cleaned CPU Cabin, Clear Browsing Caches. Reaction - ansAnticipation & planning the measures helping to restore the services. Reaction Measures - ansTurning OFF: computer Power Supply, Disconnecting: computer from Network, Reinstalling: system Applications. Data - ansAny piece of information about an Object / Entity. Information - ansNothing but processed Data. Personal Information - ansUsed by attackers to cause financial, emotional, & physical damage to users. Commercial Data Breach - ansHas considerably stronger implications other than the obvious financial one. Computer Security - ansThe protection of computing systems & the Data stored / accessed. Elements of Security - ansConfidentiality, Integrity, Nonrepudiation, Authenticity, & Availability. Confidentiality - ansThe assurance that information is not disclosed to unauthorized individuals. Integrity - ansThe assurance that information is accurate and trustworthy. Nonrepudiation - ansThe assurance that someone cannot deny the validity of their signature on a document or a message. Authenticity - ansThe assurance that the information is genuine and from a legitimate source. Availability - ansThe assurance that information and resources are accessible when needed. Security Risks - ansArise from various attacks and accidents, causing physical damage to computer systems. Potential losses due to security attacks - ansFinancial losses, Unavailability of Resources, Identity Theft, Loss of Trust, Data Theft, & Misuse of Computer Resources.
Pop Ups - ans'Unwanted Pop Ups on System / Browser' = SIGN of Spyware infection. Unexpected System Crashes - ansRegular crashes / BSoD, 'The Worst' ERROR. Excessive & Suspicious Hard Drive Activity - ansActivity when NO computer use, no programs running/DL = Malware infection. Antivirus Disabling - ansMalware programs designed to DISABLE Any Antivirus. New Browser Home Page / Toolbar - ans'New homepage & Toolbar in browser' = SIGN of Malware infection. Peculiar Program Activity - ansPrograms opening & closing automatically / strange Pop up Windows during Bootup. Random Network Activity - ansRouter display; 'Blinking' High Net Activity w/o accessing high amounts of Data. Blacklisted IP address - ans'Email stating IP Addresses are Blacklisted' = Compromised System. Antivirus - ansSoftware application that detects & eradicates malware from a computer system. FUNCTION of Antivirus - ansEssential role in Multilayered Security Strategy preventing malware. Auto-Update features - ansDesigned to allowing DLs of New Malware (keeping up-to-date). Detection TECHNIQUES - ansScanning: '...all files in memory & on the Hard Disk for Code Snippets...' TYPES of Antivirus Scanning - ansOn Access - Files scanned when loaded onto Memory; On Demand - Scanned based on Manual User Request. Integrity Checking - ansProcess of comparing the current State of stored Programs to a previously recorded state that is known to be free of Malware. Integrity checking software - ansSoftware that verifies whether a virus has damaged any file. Quarantine - ansAV Software Feature; isolates Files suspected of being infected w/ Malware. Function of Quarantine - ansPrevent isolated Files from further corrupting other Files in system. Infected Files Actions - ans(3) ACTIONS: Clean, Quarantine, or Delete. Rule of Thumb - ansSafest first, proceeding to less-safe progressively. Clean - ansAlways start here. Delete - ansONLY IF recommended by antivirus scanner. Malware types - ansWorm / Trojan: MUST BE quarantined / deleted. Choosing Antivirus Software - ansNumerous Factors MUST BE CONSIDERED: User data, Digital identity, & Financial transactions...AT STAKE! Compatibility - ansMUST BE Compatible w/ other system Programs for antivirus to be effective. Usability - ansEase of Use of antivirus software - Important deciding factor. Comprehensive Protection - ansMUST deliver round-the-clock protection for ALL Computer Domains, Types of Files, & Network elements. Quality of Protection - ansAntivirus solutions NEED to function in a Volatile Environment...regularly changing. QoP Factors - ansEffectiveness of Malware detection processes, Frequency & regularity of Updates, Ability to remove infections, Efficiency in delivering protection.
Limitations of Antivirus Software - ansThe limitations of Antivirus software MUST be known before selecting one. Limited detection techniques - ansWhile there are many techniques, software applications won't employ ALL. False alarms - ansGood antivirus software uses a combination of all techniques & supplements with verifiers. Verifiers - ansIn-depth analysis of any detected malicious code to ascertain IF...malware. Does not offer full protection - ansMS Security recommendation: Internet Firewall (along with robust antivirus software). Slows down PC / Network - ansInstalling & running Antivirus Software use a lot of RAM. Conflicts - ansTYPES: Compatibility w/ other programs on System. Install Antivirus Software - ansProvides robust protection against Viruses, Trojans, Worms, Spyware, Spam, Hackers, or other forms of threats. Function of Antivirus Software - ans2-way Firewall; monitoring incoming & outgoing Traffic & blocking suspicious Data Transfer. Windows Defender Antivirus - ansWin10 inbuilt antivirus; designed to provide Real-Time protection against Viruses, Malware, & Spyware. EICAR Test - ansEICAR File - 'harmless' Virus Test File; recognized by ALL Antivirus Software. EICAR.COM - ansTest used to ascertain whether an antivirus software is working. Malware - ansMalicious software / code that damages / disables, takes control of, or steals info from a computer system. Antivirus - ansSoftware application that detects & eradicates Malware from a computer sys. Scan & Integrity Checking - ansComputer Security Techniques in Antivirus software. Quarantine - ansFunction of Antivirus software, designed to isolate Files suspected of being infected w/ Malware. Limitations of Antivirus Software - ansLimited Detection techniques, DOES NOT FULLY Protect, Slows down PC / Network, Possible conflicts w/ other Programs. Basis for choosing the BEST Antivirus - ansReliability, Usability, Comprehensive protections, & quality of protection. Pretty Good Practice (PGP) - ansPopular software; designed to encrypt & decrypt emails sent over the Internet. Web Browser - ansInternet software program; designed to allow users to find, access, & display web pages. HTTP - ansSet of rules for transferring files on the Internet. Common Browsers - ansMS Edge, Mozilla Firefox, Google Chrome, & Apple's Safari. Encryption - ansTechniques used to secure information by converting it into a code. Privacy & Confidentiality - ansProtection of personal information from being read / intercepted / stolen. Identity Theft - ansProminent threat in age of technology; buy/sell/exchange of info online. Data Theft - ansSensitive / personal info stolen via the Internet, resold / circulated for unlawful purposes.
Encryption - ansProcess of converting information into code to prevent unauthorized access, often using Secure Socket Layer (SSL). Lock Icon - ansSymbol displayed in the address bar indicating that a website is secure. Instant Messaging (IM) - ansMethod of communication where messages are exchanged in real-time through a software application. Chat Room - ansVirtual space where users can communicate with friends in real-time. IM Networks - ansSystems that connect clients to servers operated by IM network vendors like Skype, WhatsApp, and Signal. Privacy Issues - ansConcerns related to eavesdropping, loss and leakage of personally identifiable information (PII), and IP address exposure. Malware in Transferred Files - ansRisk of viruses or trojans being included in files sent through instant messaging. Digital Natives - ansChildren growing up with the Internet, facing risks from content that may affect their mental health and wellbeing. RISKY CONTENT - ansContent that poses a risk to mental health, including pornography and age-inappropriate material. Cyber-bullying - ansElectronic communication bullying; ...ranging from sending threatening / taunting messages via email / text / IM ( Website / Social media page targeting a victim ). Symptoms (victim) - ansINCREASED sadness & loneliness, CHANGED sleeping & eating patterns, LOSS of interest in activities, MORE health complaints, LESS inclination to go to school. Stealth sites - ansWebsites using misleading URLs to increase Traffic. Misdirected searches - ansEx. "Pornography sites, to increase their site traffic, may use terms like school, sports, or movies;" Grooming - ans[ Major Risk ] Act of befriending & establishing an emotional connection... Internet Security - ansInvolves Protecting User Data from Unauthorized access. Web Browser - ansSoftware program on Internet & allowing Users to find, access, & display Web pages. Updated antivirus software - ansScan File DLs to detect presence of Malware. IM - ansMethod of communication in which messages are exchanged through a software app in real time. IM Security Issues - ansPrivacy issues, identity issues, malware in transferred files, & IM software vulnerabilities. Malware - ansGeneric Term for Malicious Software (adware - viruses). Viruses - ansSelf-replicating installation w/o user consent. Trojans - ansInstallation appearing as legitimate software. Ransomware - ansHolds user/company info ransom. Adware - ansDownloads unwanted ads. Spyware - ansSurreptitiously eavesdrops on Users. Social Network - ansWeb-based Services; designed to allow Users to Set Up an Online Profile & add Links to other Profiles. Social Networking - ansProcess of networking through such web-based services. Profile - ansCollection of information that defines/describes a User's Interests.
Disadvantages of Social Networking - ansCenter for Identity Theft, Pedophilia, Privacy concerns, etc. Advantages of Social Networking - ansForging "New" / Strengthening "Old" relationships. FUNCTION - ansIntroduces & describes the User.
Trusted Contacts Feature - ansList of Friends helping Users login into their Facebook Account when locked out. Where You're Logged In Feature - ansOption allowing User to end all previous activities not logged out. Deactivate Your Account Feature - ansFeature allowing Users to disable Profile and remove Name & Photo shared on Facebook. Privacy Settings on Facebook - ansWho can see your future posts, Review All Your Posts & Things You're Tagged in. Block Settings on Facebook - ansRestricted List, Block Users, Block App & Event Invites, Block Apps & Block Pages. Notification Settings on Facebook - ansSettings related to how users receive notifications. Follower Settings on Facebook - ansSettings related to who can follow the user. App Settings on Facebook - ansApps, Websites, & Plugins. Ads Settings on Facebook - ansSettings related to advertisements shown to the user. Security Tips for Facebook - ansMUST FOLLOWS to stay safe on FACEBOOK: Protect Identity; adjust FACEBOOK Privacy Settings. Considerations for Facebook - ansWho is allowed to become a Friend? Friend - ansLimited Friends - ONLY Access to User Profile. Social Networking Site - ansTWITTER Acct. Settings - ansStaying Safe on TWITTER Security Settings - ansStaying Safe on TWITTER Security Section - ansSecurity & Privacy settings Login Verification - ansA security measure for account access. Password Reset - ansA process to recover or change your password. Privacy Settings - ansStaying Safe on TWITTER Photo Tagging - ansA feature allowing users to tag others in photos. TWEET Privacy - ansSettings related to the visibility of tweets. TWEET Location - ansGeographical information attached to a tweet. Discoverability - ansThe ability for others to find your account. Direct Messages - ansPrivate messages sent between users on TWITTER. Password Settings - ansStaying Safe on TWITTER Email Notifications - ansAlerts sent to your email regarding account activity. Apps Settings - ansStaying Safe on TWITTER Blocking User Accounts - ansPreventing specific users from interacting with you. Social Networking - ansWeb-based Services; designed to allow Users to Set Up an Online Profile & add Links to other Profiles. Risks assoc. w/ Social Networking sites - ansPhishing, Identity Theft, Malware, Site flaws, URL Spoofing, Clickjacking, & Social engineering. Social Engineering attacks - ansGathering Important PII for Social Networking sites. Email - ansElectronic Mail; designed to communicate electronically by sending messages from one computer to another via the Internet. Email Clients - ansSoftware applications used to access and manage a user's email. Email Security - ansMeasures taken to protect email accounts and communications.
Malicious Email Attachment - ansMalicious Executable; any piece of email attachment w/ purpose to harm / compromise. Malicious User Redirection - ansEmail Links designed to redirect users to sites hosting Malware. HTTP Cookie - ansset of info stored in Name-Value Pairs by web browser. Malware Warning Screen / Pop-up - ansA warning displayed by a website indicating potential malware. Invisible Blank Page - ansA requested site that displays a blank page. Website Redirected to another Domain - ansA website that sends users to a different domain. Website inaccessible from Google Search - ansA website that cannot be found through Google Search. Website Redirects back to Google - ansA website that sends users back to Google after attempting to access it. Caution clicking Links - ansBe careful when clicking any links received via email. Full System Scan - ansA comprehensive scan of the system for malware. Unknown Senders - ansEmails from senders that are not recognized. Malicious Emails - ansEmails that contain harmful attachments or links. Phishing - ansComputer-based social engineering attack designed to reveal personal/financial information. Hyperlinks - ansLinks in emails that may lead to malicious sites. Hoax - ansSpoofed Email; forgery/fake sent with intent to compromise target security. Nigerian Scam - ansA scam that impersonates Nigeria or other African countries, requesting help obtaining funds. SPAM - ansJunk Mail; unsolicited/unwanted commercial advertisements distributed online. SPAMfighter - ansAnti-spamming tool designed to prevent unwanted Spam advertisements and provides PC optimization. Email Security Procedures - ansMeasures securing users against email-related threats. Strong Passwords - ansCreating and using complex passwords for security. Email Filtering - ansFeature designed to allow select messages for disposal or specific Email box. Scan Email Attachments for Malware - ansCheck email attachments for harmful software. Encryption - ansProcess of converting information into unreadable coded content, preventing unauthorized access. Digital Signatures - ansMethod of ensuring the authenticity of emails. Keep Me Signed In - ansFunction that should be disabled for security purposes. Recovery Email Address - ansEmail address provided for recovery purposes. HTTPS Enabled Email Service Provider - ansEmail service that uses HTTPS for secure communication. Symmetric Encryption - ansPrivate Key / Secret Key / Shared Key Encryption; designed to use a Single Key for encryption & decryption messages. Asymmetric Encryption - ansPublic-key Cryptography; designed to use Two Keys; Public key & Private key. Public Key - ansFor Encryption. Private Key - ansFor Decryption.
Theft & Loss - ansData Loss; stored information theft leading to breaches of multiple accounts. Unmanaged Applications - ansRegular Updates UNMET; vulnerabilities lead to open doors compromising phone security. Mobile Malware - ansMalicious software; specifically built to target Mobile Devices & Smartphones systems. Mobile Malware Function - ansFUNCTION: EXPLOITING vulnerabilities in mobile OSs. Root Malware - ansAttack obtaining Admin. Privileges & File Access Permissions. Insecure Data Storage - ansSensitive Info stored INSECURELY (MUST NOT Assume Safety). Insufficient Transport Layer Protection - ansData Exchange between Device & Internet Servers, (-) NOT Encrypted "appropriately". Poor Authorization & Authentication - ansProtection of Data transferred by devices, users, & systems. Broken Cryptography - ansEncryption systems; MUST employ secure encryption NOT YET solved/broken. Bluetooth - ansWireless Local Area Network (LAN) software; designed to connect phones, laptops, & printers. Bluesnarfing - ansUnauthorized attack on open & insecure Bluetooth connections to STEAL DATA. Man-in-the-middle attack - ansUnauthorized Bluetooth connection to Authorized Bluetooth communication between (2) Devices. Backdoor Hacking - ansNO LONGER Trusted device gains access to obtain present Data. Updating Mobile Operating Systems - ansFUNCTION: "...helps users plug vulnerabilities existing in the previous versions of the system." Bricking the Phone - ansROM is destroyed & the phone never turns on again. Android Update Steps - ansPlug into Power Source. Settings app - System tab - About Phone: System Updates. iOS Update Steps - ansPlug into Power Source. Settings app - General tab - Software Update. Updating Applications in Android Devices - ansEnable mobile data / wi-fi Google Play Store app - Menu icon - My Apps: Update All (/individually). Mobile Malware - ansNext Frontier for cybercriminals. Gunpowder Malware - ansCollected sensitive details of users by parading itself as a Nintendo Emulator. Antivirus apps for Android - ansExamples include 360 Security, Avira Mobile Security, Avast! Mobile Security, & ESET Mobile Security & Antivirus. Antivirus apps for iOS - ansExamples include Lookout Mobile Endpoint Security, McAfee Security, VirusBarrier, & Avira Mobile Security. Bluetooth Connectivity Precautions - ansSecure Bluetooth Pairing; Security PIN ONLY. Cabir Virus - ansONLY infected systems whose user accepted & chose to install the attached file. Wi-Fi Connectivity Issues - ansPiggybacking - UnauthZ internet access w/ another user's Broadband connection.
WEP - ansBasic Encryption; LEAST SECURE, easily cracked but compatible w/ a wide range of devices including older hardware. WPA2 - ansMOST SECURE but ONLY compatible w/ hardware manufactured since 2006. Android encryption feature - ansRequires a passcode entered into the phone every time it is switched on & unlocked. iOS encryption feature - ansEnabling a passcode automatically encrypts data on the phone. Mobile Devices Theft - ansEvolution of mobile devices into mobile wallets leading to an alarming rise of virtual pickpockets. Data Backup - ansMUST Backup Data; computer, USB drive, or Cloud service. SIM PIN Protection - ansA method to secure iPhone & iPad devices. General Approaches to SECURITY - ansSecuring iPhone-Enabling SIM PIN PROTECTION. Damage Control Steps - ansContact Service Provider to block SIM Card, preventing fraudulent use. Find my Phone software - ansUsed to track the phone if installed. Security Precautions - ansBe Aware of Surroundings - DO NOT Create opportunity for thieves. Insurance for Devices - ansInsurance through wireless provider / third-party entities for replacement device. Device Pairing Precautions - ansDevice Pairing in Private Location; reduced chance of PIN Cracking. Vendor Website Check - ansCheck regularly for device Updates / Security Patches. Encrypt wireless connection - ansChoose the highest level of protection that all computers in a network can handle. Manufacturer's Instructions - ansCheck (WAP) Default Username, Password, & Net name. Admin Page Settings - ansSave Settings (@bottom) after changing WAPs Password and Wireless tab Net name. SIM PIN - ansAdded layer of Protection; "...four-digit PIN provides security to the SIM Card even if it is stolen, & prevents its misuse." Touch ID - ansAllows users to "...also use their Fingerprints instead of a Passcode. Auto-Lock feature - ans"...helps in saving Battery Life & increasing Device Security. Data Backup - ansHelps restore Data; "...contains Files that are present on the phone." Lost Mode - ans"...remotely lock...device with a four-digit passcode." Android - ansMobile phone OS; "...open-source nature & ease of use." Security - ansGeneral Approaches to SECURITY. Screen Lock - ansLock pattern / 4-digit PIN / Password. SIM Lock - ansAdded layer of Protection; "...four-digit PIN provides security to the SIM Card even if it is stolen." Data Backup (Android) - ansRecovery of stolen device / wiped Data. Encryption - ans"...extremely difficult for hackers to steal data, even when a phone is stolen physically." Android Device Manager - ansFind Lost Phones; "...ONLY works IF the device is signed into a Google Acct., & Location access for the device is turned ON."
IMPACTS of Mobile Malware - ansSteal confidential data, Rack up Long-distance charges, & collect User data. Mobile Device Security Risks - ansEavesdropping, Unmanaged apps, Theft & loss, Unauthorized access, & Mobile devices NOT limiting Internet connections. Mobile App Vulnerabilities - ansInsecure Data Storage, broken Cryptography, insufficient Transport Layer protection, & poor Authorization & Authentication. Bluetooth Device Threats - ansBluesnarfing, MITM, & Backdoor hacking. Regularly UPDATING Mobile operating systems - ansHelps users plug existing vulnerabilities in their Mobile OS. Encrypting smartphones - ansIncreased Security. Android Encryption - ansRequires a passcode entered into the phone every time it is switched on & unlocked. iOS Encryption - ansEnabling a passcode automatically encrypts data on the phone. Phone Theft Prevention Steps - ansBe aware, Encrypt phone, Backup data, & Insure phone. Smartphone Theft Steps - ansContact service provider, File a report w/ Police, & Track phone (Find my Phone app). SIM PIN - ansAdded layer of protection, a 4-digit PIN provides security to the SIM Card even IF it is stolen & prevents its misuse. Passcodes - ansProtect User Data; device ONLY unlocked IF correct Password is entered. Auto-Lock - ansHelps in saving Battery Life & increasing device security. Phone stolen / Data wiped - ansAvailability of a Data Backup can help restore the data; contains files that are present on the phone. Mobile Security Tools - ansLookout Mobile Endpoint Security & Norton Mobile Security. Cloud Architecture Types - ansPrivate Cloud, Public Cloud, Community Cloud, Hybrid Cloud. Cloud Computing Types - ans(IaaS) Infrastructure as a Service, (PaaS) Platform as a Service, (SaaS) Software as a Service. Cloud Computing Advantages - ansFlexibility, Cost Effectiveness, Portability. Data Breach - ansUnauthorized access and retrieval of sensitive information. Data Loss - ansPermanent loss of data due to various reasons such as accidental deletion or corruption. Account Hacking - ansUnauthorized access to a user's account, often for malicious purposes. Disgruntled Insider - ansAn employee or contractor who may misuse their access to harm the organization. Technology Loopholes - ansVulnerabilities in technology that can be exploited by attackers. Shared Space - ansCommon storage areas in cloud environments that may expose data to unauthorized users. Back up data - ansCreating copies of data to prevent loss in case of failure. Update Backups regularly - ansEnsuring that backup copies are current and reflect the latest data. Create Strong Passwords - ansUsing complex and unique passwords to enhance security. Choose Two-Step Authentication - ansImplementing an additional verification step beyond just a password. Encrypt - ansConverting data into a coded format to prevent unauthorized access.
Have a disciplined online behavior - ansPracticing safe and responsible use of online resources. Avoid keeping sensitive information on cloud - ansNot storing critical data in cloud environments to reduce risk. Data Ownership - ansThe legal rights to control and manage data once uploaded to the cloud. Data Location - ansThe geographical location where data is stored, which may affect privacy laws. Data Migration - ansThe process of moving data from one storage location to another. Data Permanency - ansThe state of data being retained indefinitely, even after deletion. Cloud Privacy Issues - ansConcerns regarding the protection of user data in cloud environments. SECURING DATA - ansImplementing measures such as backups, strong passwords, and encryption. Types of Networks - ansCategories of networks including LAN, WAN, and VPN. Home Network - ansA network setup for personal devices within a household. Internet Connectivity - ansThe ability to connect multiple devices to the internet simultaneously. File & Folder access - ansThe ability to share and access files across devices on a network. Centralized management of Network Security settings - ansControlling security settings for all devices connected to a network from a single point. Home Network - ansGroup of computers & other devices connected with each other to exchange data. LAN - ansIndividual network that covers a single geographical area, providing networking services to people within close proximity to each other, such as in an office or school. WAN - ansNetwork that exists over a large-scale geographical area and connects various smaller networks, including LANs. VPN - ansPrivate network that is created between two computers/devices. Ethernet - ansMethod of Internet Connection where users plug in a cable into their computers to connect to the Internet. Home Networking - ansProcess of interconnecting all devices in a home together and with the Internet; these devices include computers, laptops, mobile phones, and tablets. Wireless Networks - ansComputer networks that are not connected by cables of any type. WLAN - ansWireless Local Area Network. WMAN - ansWireless Metropolitan Area Network. WWAN - ansWireless Wide Area Network. WPAN - ansWireless Personal Area Network. WEP - ansWired Equivalent Privacy; basic encryption that is the least secure and easily cracked. WPA - ansWi-Fi Protected Access. WPA2 - ansWi-Fi Protected Access Version 2; the most secure encryption method but only compatible with hardware manufactured since 2006. Encryption - ansMethod to secure data by converting it into a code to prevent unauthorized access.
Files to Backup - ansPrioritize data and ensure it is up-to-date; incomplete or obsolete data is no good. Backup Frequency - ansRegularly scheduled updates of backups; recommended once a week or once in 10 days. Full System Backup - ansBackup of all the files and their respective folders, which is a complete copy of all data. Incremental Backup - ansAfter a full backup, only files that have changed or been created since the last backup are included. Restoring Incremental Backup - ansRequires the first full backup and all previous incremental backups restored sequentially to get to the last backed up state. Differential Backup - ansIncludes changed files since the last full backup. Online Data Backup - ansData backup on remote data storage devices through the Internet. Download & Install Backup - ansOnline backup service provider software interface that connects the user system to a remote server. Web Based Backup - ansOnline data backup service allowing access to stored data from any system using an Internet connection. Advantages of Online Data Backup - ansRemote storage provides a copy in a secondary location in case of accidents or natural disasters. Backup Hardware - ansCost-effective hardware that is purchased and maintained by the Cloud service. Data Backup Types - ansIncludes Full System Backup, Incremental Backup, Differential Backup, and Online Data Backup. Regular Training - ansCaution and regular training on data handling procedures to prevent human error. Caution with Downloads - ansBest practice to exercise caution when downloading and clicking links online. Data Recovery - ansFast & Portable. Backup Reports - ansRegularly from Service Provider. Online Backup Service Providers - ansA number offer Free Storage up to a limit, beyond which services are chargeable. Google Drive - ansCloud service provided by Google that offers 15GB free storage space. Dropbox - ansDownloadable virtual drive app that provides 2 GB Free storage space. Microsoft OneDrive - ansOffline virtual drive (Win/Mac OS X) that offers 15 GB Free Storage. Apple iCloud - ansFree cloud storage service. Mega - ansFree cloud storage service. Box - ansFree cloud storage service. Knowhow Cloud - ansFree cloud storage service. SOS Online Backup - ansPaid pro backup service. Carbonite - ansPaid pro backup service. Backblaze - ansPaid pro backup service. Full Backup - ansSystem Image Backup process to create a complete backup of the system. Incremental Backup - ansFile History Backup process that saves changes since the last backup.
Time Machine - ansApple's backup utility that automatically saves up-to-date copies of Mac data. Data Breach - ansPrimary way of Data Loss from used & discarded Computers & Phones. Data Deleting - ansNot the same as destruction; only the Master Index gets formatted. Permanent Destruction - ansOverwriting all hard drive segments with gibberish until original data is no more. Data Encryption - ansRenders Hard Drive unusable before destroying & discarding. Wiping Hard Drives - ansUsing tools to overwrite files with gibberish during many passes. Physical Destruction - ansMost effective way to destroy hard drives. Eraser - ansFree secure file deletion tool that allows for secure removal of data from drives. US DoD 5220.22-M - ansAn industry standard deletion process that overwrites data 7 times. Gutmann method - ansAn industry standard deletion process that overwrites data 35 times. Backup - ansProcess of creating duplicate copies of important data and storing it on media storage devices. Data Loss Reasons - ansHuman error, Software failures, Computer viruses, Hardware malfunctions, Hardware thefts, & Natural disasters. Backup Types - ansFull / Incremental / Differential / Online (in Nature). Windows 10 Backup Types - ansFull & Incremental. Mac OS X Backup Types - ansFull & Incremental (in-one). Hard Drive Disposal - ansDiscarding Hard Drive MUST Permanently Destroy, not just DELETE. IoT Devices - ansDevices connected to the Internet to gather and share data. Security Risks in Smart Devices - ansRisks associated with Smart Watch / TV / Bulb / Lock. Inadequate Evaluation of IoT Consumer Safety - ansA risk associated with Smart Watches. Bluetooth Interception - ansA security risk associated with Smart Locks. Outdated Firmware - ansA security risk associated with Smart Bulbs. Two-Factor Authentication - ansA security measure to prevent unauthorized pairing of Smart Watches. Smart Home Systems - ansExamples include Amazon Alexa, Google Assistant, Wink Hub, Samsung SmartThings Hub. Securing Alexa Devices - ansErase Alexa Voice Recordings Every Day. IoT Children's Toys - ansIncludes Learning Development Toys, Toys to Life, Robotics / Remotely Controllable Toys, Wearables. Security Risks of IoT Children's Toys - ansRisks associated with the use of IoT toys. Gaming Consoles - ansSpecialized computers for video games connected to a display and controlled using game controllers. Spoofed Websites - ansA security risk associated with Gaming Consoles. DDoS Attacks - ansA security risk associated with Gaming Consoles. IoT Risk Countermeasures - ansDevice Identification, Access Control, Security Monitoring, & Analysis. Secure Internet Connection - ansA countermeasure for risks associated with Gaming Consoles. Robust Strong Passwords - ansProvides security from Phishing & Malware attacks. Remote Work - ansWork conducted outside of a traditional office environment.