This type of hackers are all about hacking challenges.
Golden hat
______ are very difficult to combat, since they hide in the operating system.
rootkits
It is the most basic internet protocol you can use when transfering text or other content to a website. It shows your data as it is.
http
These rights allow us to request and manage the data that companies have about us.
ARCO rights
It is an illegal activity in which attackers manipulate people into giving away sentitive information.
Social engineering
A ______ is , specifically, a type of _______ that can steal your passwords by recording everything you write on your keyboard.
keylogger, spyware
What are the two main things that https does to guarantee private and secure online browsing?
1. Encrypt data
2. Provide digital certificates
It is the right to keep organizations from gathering unnecessary data without your consent.
Right to Oposition
This type of attack can be avoided by using long, complex passwords.
Brute force
These two types of malware are often combined in order to adapt to specific user profiles, instead of bombarding them with random content.
Adware & Spyware
What is the main difference between VPN and Tor?
VPN uses one encrypted proxy server, while Tor uses three of them. Also, VPN is usually paid, while Tor is free to use.
What does the Olimpia Law work against?
Unconsented publishing or commercializing of intimate videos or images.
An ______ is a piece of software that looks for ______ in a system in order to let malware in.
exploit, vulnerabilities
A ______ is a type of malware that creates a ______, which can be used to perform _______ attacks.
bot, botnet, DDoS.
What are third-party cookies and how can they track your activity online? (one example)
Cookies that are used by companies separate from the website you visit, such as social media or advertising. They can use buttons such as "like" and "tweet" in order to track the websites you visit.
*see Tracking protection
How does the mexican law about data privacy relate to cookies? Remember its important points:
- To use a Privacy policy
- To specify what and how data is used
- To inform if data is shared with 3rd parties
- To inform which data is unnecessary to gather
Websites must specify:
- What and how data is used by showing a cookie warning.
- Which cookies are not necessary (e.g. marketing cookies) for the website to work.
- Which cookies are shared with third parties.