What should you check before clicking a hyperlink?
Whether the hyperlink looks suspicious.
What does 'https' signify in browser safety?
It indicates that the connection is encrypted.
1/125
p.13
Browser and Connection Safety

What should you check before clicking a hyperlink?

Whether the hyperlink looks suspicious.

p.8
Browser and Connection Safety

What does 'https' signify in browser safety?

It indicates that the connection is encrypted.

p.13
Browser and Connection Safety

What is an important aspect of browser safety?

Checking if the website address is usual for the claimed shop/company.

p.23
Information Security Measures

What should you always remind yourself regarding offers?

There’s no such thing as a free lunch.

p.9
Password Management and Security

What is a common issue with password management?

Reusing the same password on multiple sites.

p.4
Privacy Rights and Legislation

Why is the protection of personal sensitive data important?

To prevent unauthorized access and potential identity theft.

p.11
Two-Factor Authentication (2FA)

What is an example of a possession factor in 2FA?

A mobile app.

p.5
Information Security Measures

How does technology enhance our lives?

By providing various conveniences and opportunities.

p.9
Password Management and Security

What is the most common way of authentication?

Password.

p.10
Password Management and Security

What is a better way of password management?

Using length with randomness (entropy) in passwords.

p.6
Cybersecurity Terminology

What does verification mean in the context of cybersecurity?

To check if something (e.g., account ownership) is real.

p.18
Privacy Rights and Legislation

What does control of information about oneself imply?

The ability to manage who can access personal data.

p.16
Malware and Phishing Threats

What can malicious apps do once installed on a device?

Spy and collect data from the system.

p.15
Browser and Connection Safety

What does a VPN stand for?

Virtual Private Network.

p.16
Malware and Phishing Threats

What are short links and why are they risky?

Web address identity is hidden behind short ones, making them potentially malicious.

p.4
Information Security Measures

What are system security issues?

Challenges and vulnerabilities that can affect the integrity, confidentiality, and availability of information systems.

p.14
Browser and Connection Safety

What should you do regarding WiFi networks?

Use known and trusted WiFi networks only.

p.19
Digital Footprint and Personal Data

What does your digital footprint include?

Buying choices, listening preferences, search history, and location timeline.

p.12
Browser and Connection Safety

What can you verify through a server certificate?

You can verify and decide whether to trust the web server.

p.7
Cybersecurity Terminology

What is a common activity that can expose users to security threats?

Reading SMS on a mobile phone.

p.2
Digital Footprint and Personal Data

What types of personal information are commonly found in the digital world?

Assignments, notes, social profiles, photos, videos, friends, contacts, and personal data.

p.7
Cybersecurity Terminology

What is a significant security threat in a digital society like Hong Kong?

Threats are prevalent even when reading SMS on a mobile phone.

p.7
Cybersecurity Terminology

What should individuals be aware of in a digital society?

The various security threats that surround them.

p.11
Two-Factor Authentication (2FA)

What does 2FA stand for?

Two-Factor Authentication.

p.15
Browser and Connection Safety

What is the purpose of blocking unknown or malicious connections?

To protect your computer from potential threats.

p.10
Password Management and Security

Why is it important to frequently update passwords?

To avoid loss from password leakage at the service provider side.

p.3
Types of Cybercrimes

What is a common type of cybercrime involving stealing information and money?

Stealing.

p.8
Browser and Connection Safety

What is important for server safety?

Using a trusted identity.

p.1
Information Security Measures

What does information security aim to protect?

Confidentiality, integrity, and availability of data.

p.23
Information Security Measures

What is important to read and understand?

Security and privacy issues.

p.4
Information Security Measures

What is a key measure for using IT services securely?

Implementing strong security protocols and practices.

p.5
Information Security Measures

What is a risk associated with technology in terms of data?

Possibility of unauthorized access to systems and data.

p.18
Privacy Rights and Legislation

What is a key aspect of ensuring access to sensitive data?

Freedom from intrusion.

p.15
Browser and Connection Safety

What are two important tools for connection safety?

Firewalls and anti-virus software.

p.12
Browser and Connection Safety

What type of data transfer does HTTPS ensure?

Encrypted data transfer.

p.19
Digital Footprint and Personal Data

What role do cookies play on websites?

Cookies help websites remember about you.

p.21
Privacy Rights and Legislation

What does privacy theft include?

Theft of information.

p.15
Browser and Connection Safety

Can every VPN server be considered trustworthy?

No, not every VPN server is trustworthy.

p.17
Information Security Measures

What is a common cause of physical hardware failure?

Wear and tear over time.

p.13
Browser and Connection Safety

How can you verify the legitimacy of a website?

Using an online whois tool.

p.13
Browser and Connection Safety

What does integrity and identity refer to in browser safety?

Ensuring the authenticity of websites and hyperlinks.

p.14
Browser and Connection Safety

What is essential for secure communication over WiFi?

Proper encryption between the network access point and your computer.

p.23
Information Security Measures

Who should you share your experiences with?

Friends and family.

p.21
Privacy Rights and Legislation

What is privacy theft?

Intentional, institutional uses of personal information.

p.9
Password Management and Security

What is a common length for a commonly used password?

9 characters.

p.6
Cybersecurity Terminology

What is encryption?

To transform data into an unviewable form unless with proper authorization.

p.21
Privacy Rights and Legislation

How can inadvertent leakage of information occur?

Through negligence or carelessness.

p.20
Privacy Rights and Legislation

What is invisible information gathering?

The collection of personal data without the individual's knowledge or consent.

p.8
Cybersecurity Terminology

What role do many computers play in data transmission?

They act as hosts involved in the transmission.

p.12
Browser and Connection Safety

What is the purpose of HTTPS?

To provide a secure connection with encrypted data transfer between the web server and the user.

p.6
Cybersecurity Terminology

What is authentication?

To verify a user with credentials (e.g., username/password) as the correct person.

p.7
Cybersecurity Terminology

What is a personal concern regarding security threats?

It varies by individual; each person may have different concerns.

p.17
Information Security Measures

What are some examples of natural hazards that can pose threats?

Natural disasters like earthquakes, floods, and storms.

p.17
Information Security Measures

What can cause power supply failures?

Issues like outages, surges, or equipment malfunctions.

p.11
Two-Factor Authentication (2FA)

What is an example of an inherent factor in 2FA?

Biometrics.

p.17
Information Security Measures

How can careless mistakes impact security?

They can lead to data breaches or loss of information.

p.3
Types of Cybercrimes

What type of cybercrime involves harassment through sexual or other means?

Harassment.

p.20
Privacy Rights and Legislation

What is data mining?

The process of analyzing large datasets to discover patterns and extract valuable information.

p.8
Browser and Connection Safety

What type of Wi-Fi connection is recommended for safety?

Private Wi-Fi.

p.14
Browser and Connection Safety

Why is WiFi usually riskier than wired connections?

Because all messages are broadcasted to everyone in the network.

p.6
Cybersecurity Terminology

What is validation in cybersecurity?

To check if something (e.g., an account, an email) is valid or existing.

p.22
Identity Theft and Social Engineering

What is identity theft?

The act of impersonating someone using their personal data.

p.23
Information Security Measures

What is the final wish given in the hints?

Good luck!

p.22
Identity Theft and Social Engineering

What types of identities can be affected by identity theft?

Both online and offline identities.

p.22
Identity Theft and Social Engineering

What is a deepfake?

A technology that can create realistic fake videos or audio, potentially stealing someone's face and voice.

p.22
Identity Theft and Social Engineering

What aspects of a person can be stolen through identity theft?

Their face and voice.

p.15
Browser and Connection Safety

What can a VPN help to hide?

Your network location.

p.21
Privacy Rights and Legislation

What question should we ask about cloud service providers?

How much trust should we devote to them?

p.17
Information Security Measures

What security issues can arise at infrastructure service providers?

Vulnerabilities in their systems that can affect clients.

p.1
Digital Footprint and Personal Data

What is the focus of the course ENGG1003/1004?

Digital Literacy and Computational Thinking.

p.12
Browser and Connection Safety

What does HTTPS stand for?

HyperText Transfer Protocol Secure.

p.14
Browser and Connection Safety

What is the risk of having no encryption on a WiFi network?

Messages can be intercepted by anyone on the network.

p.10
Password Management and Security

What type of password is recommended for better security?

A combination of words or a complex sentence that fits the user.

p.19
Digital Footprint and Personal Data

What should you consider about mobile apps?

How much access rights you authorized for different mobile apps.

p.6
Cybersecurity Terminology

What does authorization determine?

The permission on what a user can access (e.g., change a file, or remove some data).

p.19
Digital Footprint and Personal Data

What is a concern related to digital marketing?

Monitoring and censorship.

p.10
Password Management and Security

What are password managers or 'Passkey' systems?

Tools that allow users to sign in using alternative methods instead of traditional passwords.

p.3
Types of Cybercrimes

What is blackmail in the context of cybercrime?

A revenue model by threatening individuals.

p.1
Privacy Rights and Legislation

Why is personal data privacy important in information security?

To protect individuals' sensitive information from unauthorized access and misuse.

p.19
Digital Footprint and Personal Data

What should you check regarding data sharing?

Whether you agreed to your data being shared in the small print.

p.16
Malware and Phishing Threats

What is spoofing in the context of cybersecurity?

Pretending to be other sites you expect.

p.21
Privacy Rights and Legislation

What should individuals consider regarding their actions?

Think carefully for our own actions.

p.17
Information Security Measures

What personal issues can lead to security threats?

Stress, distractions, or personal crises affecting focus.

p.2
Digital Footprint and Personal Data

What could happen if you lost access to your digital information?

You may lose important assignments, memories, and connections.

p.8
User Education

What should users verify regarding websites?

Whether it is the expected website.

p.23
Information Security Measures

What should you do before trusting information?

Double check and verify.

p.4
Information Security Measures

What do information security policies and practices aim to achieve?

To establish guidelines for protecting information assets and ensuring compliance.

p.9
Password Management and Security

What is a risky practice regarding password storage?

Saving or writing down passwords next to account details.

p.18
Privacy Rights and Legislation

What does freedom from being followed, tracked, watched, and eavesdropped upon refer to?

The right to privacy.

p.18
Privacy Rights and Legislation

Who should ideally be able to read your sensitive data?

Only you and authorized individuals.

p.18
Privacy Rights and Legislation

Who are actually able to read your sensitive data?

Various entities, including companies and potentially unauthorized individuals.

p.16
Malware and Phishing Threats

What type of links can lead to malicious websites?

Malicious links.

p.11
Two-Factor Authentication (2FA)

Where is 2FA commonly used?

Online banking, shopping, computer login, and various services.

p.20
Privacy Rights and Legislation

What is the Personal Data (Privacy) Ordinance in Hong Kong?

Legislation that governs the collection, use, and handling of personal data in Hong Kong.

p.2
Digital Footprint and Personal Data

What are the implications of losing control over your digital data?

Someone else could misuse your personal information or impersonate you.

p.5
Cybersecurity Terminology

What is a potential negative aspect of technology?

It enriches the opportunity to cheat unsuspecting people.

p.5
Information Security Measures

What is essential to ensure the control of your data?

Implementing security measures.

p.22
Identity Theft and Social Engineering

What can be used to impersonate a person?

Enough personal data.

p.10
Password Management and Security

How can extra symbols and numbers affect password strength?

They can help enhance password complexity.

p.21
Privacy Rights and Legislation

What is one way privacy theft can occur?

Unauthorized use or release by 'insiders'.

p.15
Browser and Connection Safety

What is one benefit of using a VPN?

It provides an extra layer of connection and potential extra encryption.

p.3
Types of Cybercrimes

What type of cybercrime involves using a false identity and transaction?

Cheating.

p.3
Types of Cybercrimes

What type of cybercrime includes various kinds of scams?

Fraud.

p.17
Information Security Measures

What are organizational threats?

Risks arising from internal policies, culture, or management.

p.17
Information Security Measures

What is a crucial step to protect your data?

Always backup your data!

p.20
Privacy Rights and Legislation

What is the EU's General Data Protection Regulation (GDPR)?

A comprehensive data protection law that governs how personal data is collected and processed in the EU.

p.9
Password Management and Security

What are two common mistakes people make when creating passwords?

Setting too simple or too short passwords.

p.16
Malware and Phishing Threats

Where is malware especially common?

On mobile devices.

p.4
Cybersecurity Terminology

Does this course cover the technical aspects of hacking?

No, it does not cover the technical aspects of hacking and professional defense.

p.12
Browser and Connection Safety

What information can you find in the certificate of the CUHK website?

Details about the server's identity and trustworthiness.

p.10
Password Management and Security

What is a passwordless system?

A system that allows users to sign in using other means, such as biometric devices.

p.16
Malware and Phishing Threats

What is a common method used to collect sensitive data?

Phishing.

p.21
Privacy Rights and Legislation

What can lead to accidents in privacy theft?

Accidents by service providers.

p.20
Privacy Rights and Legislation

What is secondary use of data?

Using personal data for purposes other than what it was originally collected for.

p.11
Two-Factor Authentication (2FA)

What is the purpose of Two-Factor Authentication?

To provide extra security beyond a plain password.

p.11
Two-Factor Authentication (2FA)

What are the components of a valid 2FA combination?

Knowledge factor, possession factor, inherent factor, and location-based factor.

p.11
Two-Factor Authentication (2FA)

What is an example of a knowledge factor in 2FA?

A password.

p.3
Types of Cybercrimes

What does the term 'abduct' refer to in the context of cybercrime?

Hijacking websites.

p.3
Types of Cybercrimes

What does 'rob' refer to in cybercrime?

Stealing cyber assets.

p.17
Information Security Measures

What types of hazards can fire and water pose?

They can damage physical infrastructure and data storage.

p.11
Two-Factor Authentication (2FA)

What is an example of a location-based factor in 2FA?

Network location.

p.3
Types of Cybercrimes

What does libel mean in cyberspace?

Abuse of freedom of speech.

p.20
Privacy Rights and Legislation

What does 'the right to be forgotten' entail?

The right for individuals to have their personal data deleted upon request.

p.20
Privacy Rights and Legislation

What is informed consent?

The process of obtaining permission from individuals before collecting or using their personal data.

p.20
Privacy Rights and Legislation

What role does the Privacy Commissioner for Personal Data play?

Oversees and enforces data protection laws in Hong Kong.

Study Smarter, Not Harder
Study Smarter, Not Harder