Copyright
Attacks on Your Computer
Credit Card Fraud
Passwords
Secure Networks
100
When you give credit for text you found on a website, it is usually done in a
What is bibliography.
100
How is malware defined.
What is hostile or intrusive software.
100
One of your first responses to fraudulent charges should be.
What is call the company, or have the card deactivated.
100
A common, but usually insecure method of remembering passwords.
What is writing them down.
100
Why should you be cautious when using free wifi from a cafe?
What is it can be monitored easily by third parties.
200
This exemption permits individuals to reproduce selected materials for educational purposes without the permission of the copyright holder.
What is Fair Use.
200
The method through which Trojan horses infect your machine.
What is pretending to be a legitimate application.
200
How should you dispose of credit statements
What is shredding them
200
This length of Upper and Lower alphabetic password can be cracked in less than 9 minutes
What is 7 characters
200
A common mistake when setting up a home router.
What is leaving the default password the same.
300
When does a created work fall into public domain.
What is 70 years after the death of author, or, for corporate works, anonymous works, or works for hire, 95 years from the date of publication or 120 years from the date of creation, whichever expires first. http://www.teachingcopyright.org/handout/public-domain-faq
300
A piece of malware that encrypts the hard drive of an infected device, and then asks the user for money.
What is Randsomware or Cryptolocker.
300
Why do credit card companies ask you to sign for purchases.
What is to give a sense of security. It really doesn't do anything. No one looks at it.
300
The best way to increase the time it takes to break a password
What is making it longer
300
How can you keep safe while accessing public wifi?
What is don't use it for any activity dealing with sensitive information (banking, shopping, etc.)
400
What is the reason you unable to watch copyrighted movies from Netflix in the study lounge.
What is the lounge is considered a public area, and Netflix or DVDs only give you private viewing rights.
400
A group of computers sending a very rapid set of requests through the Internet to a single computer in order to interrupt or stop the computer from doing things is called
What is DDoS
400
The largest recorded credit card fraud ring made over.
What is 300 million dollars.
400
A practice that will mitigate the damage that can be done if your password is discovered for one site.
What is making unique passwords for every site.
400
How you know that your web browsing session is encrypted
What is seeing HTTPS as the prefix
500
A license that the creator of a work can use to change from the default "all rights reserved" to "some rights reserved".
What is Creative Commons. creativecommons.org
500
A piece of malware that infected nuclear facilities via a infected USB drive, and that messed with the command and control systems of the infected facilities.
What is Stuxnet
500
The average cost of a stolen credit card.
What is from 40 cents to 10$ depending on how much information it comes with. (Prices pulled from http://www.zdnet.com/article/cardcops-stolen-credit-card-details-getting-cheaper/)
500
A password is generally used to create a ______ which is then compared to the ______ stored by the site in order to authenticate the user's password. (MD5 and SHA1 create these)
What is a hash.
500
How can you keep your anonymity on the web?
What is set up a VPN and use that to connect to a series of proxies (like TOR). Use a bridge and spoof your MAC address.
M
e
n
u