Cybersecurity
& Malware
Browsing privacy
Privacy Regulations
100

This type of hackers are all about hacking challenges.

Golden hat

100

______ are very difficult to combat, since they hide in the operating system.

rootkits

100

It is the most basic internet protocol you can use when transfering text or other content to a website. It shows your data as it is.

http

100

These rights allow us to request and manage the data that companies have about us.

ARCO rights

200

It is an illegal activity in which attackers manipulate people into giving away sentitive information.

Social engineering

200

A ______ is , specifically, a type of _______ that can steal your passwords by recording everything you write on your keyboard.

keylogger, spyware

200

What are the  two main things that https does to guarantee private and secure online browsing?

1. Encrypt data

2. Provide digital certificates

200

It is the right to keep organizations from gathering unnecessary data without your consent.

Right to Oposition

300

This type of attack can be avoided by using long, complex passwords.

Brute force

300

These two types of malware are often combined in order to adapt to specific user profiles, instead of bombarding them with random content.

Adware & Spyware

300

What is the main difference between VPN and Tor?

VPN uses one encrypted proxy server, while Tor uses three of them. Also, VPN is usually paid, while Tor is free to use.

300

What does the Olimpia Law work against?

Unconsented publishing or commercializing of intimate videos or images.

400

An ______ is a piece of software that looks for ______ in a system in order to let malware in.

exploit, vulnerabilities

400

A ______ is a type of malware that creates a ______, which can be used to perform _______ attacks.

bot, botnet, DDoS.

400

What are third-party cookies and how can they track your activity online? (one example)

Cookies that are used by companies separate from the website you visit, such as social media or advertising. They can use buttons such as "like" and "tweet" in order to track the websites you visit.

*see Tracking protection

400

How does the mexican law about data privacy relate to cookies? Remember its important points:

- To use a Privacy policy
- To specify what and how data is used
- To inform if data is shared with 3rd parties
- To inform which data is unnecessary to gather

Websites must specify:

- What and how data is used by showing a cookie warning.
- Which cookies are not necessary (e.g. marketing cookies) for the website to work.
- Which cookies are shared with third parties.


M
e
n
u