p.13
Browser and Connection Safety
What should you check before clicking a hyperlink?
Whether the hyperlink looks suspicious.
p.8
Browser and Connection Safety
What does 'https' signify in browser safety?
It indicates that the connection is encrypted.
p.13
Browser and Connection Safety
What is an important aspect of browser safety?
Checking if the website address is usual for the claimed shop/company.
p.23
Information Security Measures
What should you always remind yourself regarding offers?
There’s no such thing as a free lunch.
p.9
Password Management and Security
What is a common issue with password management?
Reusing the same password on multiple sites.
p.4
Privacy Rights and Legislation
Why is the protection of personal sensitive data important?
To prevent unauthorized access and potential identity theft.
p.5
Information Security Measures
How does technology enhance our lives?
By providing various conveniences and opportunities.
p.10
Password Management and Security
What is a better way of password management?
Using length with randomness (entropy) in passwords.
p.6
Cybersecurity Terminology
What does verification mean in the context of cybersecurity?
To check if something (e.g., account ownership) is real.
p.18
Privacy Rights and Legislation
What does control of information about oneself imply?
The ability to manage who can access personal data.
p.16
Malware and Phishing Threats
What can malicious apps do once installed on a device?
Spy and collect data from the system.
p.16
Malware and Phishing Threats
What are short links and why are they risky?
Web address identity is hidden behind short ones, making them potentially malicious.
p.4
Information Security Measures
What are system security issues?
Challenges and vulnerabilities that can affect the integrity, confidentiality, and availability of information systems.
p.14
Browser and Connection Safety
What should you do regarding WiFi networks?
Use known and trusted WiFi networks only.
p.19
Digital Footprint and Personal Data
What does your digital footprint include?
Buying choices, listening preferences, search history, and location timeline.
p.12
Browser and Connection Safety
What can you verify through a server certificate?
You can verify and decide whether to trust the web server.
p.7
Cybersecurity Terminology
What is a common activity that can expose users to security threats?
Reading SMS on a mobile phone.
p.2
Digital Footprint and Personal Data
What types of personal information are commonly found in the digital world?
Assignments, notes, social profiles, photos, videos, friends, contacts, and personal data.
p.7
Cybersecurity Terminology
What is a significant security threat in a digital society like Hong Kong?
Threats are prevalent even when reading SMS on a mobile phone.
p.7
Cybersecurity Terminology
What should individuals be aware of in a digital society?
The various security threats that surround them.
p.11
Two-Factor Authentication (2FA)
What does 2FA stand for?
Two-Factor Authentication.
p.15
Browser and Connection Safety
What is the purpose of blocking unknown or malicious connections?
To protect your computer from potential threats.
p.10
Password Management and Security
Why is it important to frequently update passwords?
To avoid loss from password leakage at the service provider side.
p.8
Browser and Connection Safety
What is important for server safety?
Using a trusted identity.
p.1
Information Security Measures
What does information security aim to protect?
Confidentiality, integrity, and availability of data.
p.23
Information Security Measures
What is important to read and understand?
Security and privacy issues.
p.4
Information Security Measures
What is a key measure for using IT services securely?
Implementing strong security protocols and practices.
p.5
Information Security Measures
What is a risk associated with technology in terms of data?
Possibility of unauthorized access to systems and data.
p.15
Browser and Connection Safety
What are two important tools for connection safety?
Firewalls and anti-virus software.
p.19
Digital Footprint and Personal Data
What role do cookies play on websites?
Cookies help websites remember about you.
p.15
Browser and Connection Safety
Can every VPN server be considered trustworthy?
No, not every VPN server is trustworthy.
p.13
Browser and Connection Safety
How can you verify the legitimacy of a website?
Using an online whois tool.
p.13
Browser and Connection Safety
What does integrity and identity refer to in browser safety?
Ensuring the authenticity of websites and hyperlinks.
p.14
Browser and Connection Safety
What is essential for secure communication over WiFi?
Proper encryption between the network access point and your computer.
p.21
Privacy Rights and Legislation
What is privacy theft?
Intentional, institutional uses of personal information.
p.6
Cybersecurity Terminology
What is encryption?
To transform data into an unviewable form unless with proper authorization.
p.21
Privacy Rights and Legislation
How can inadvertent leakage of information occur?
Through negligence or carelessness.
p.20
Privacy Rights and Legislation
What is invisible information gathering?
The collection of personal data without the individual's knowledge or consent.
p.8
Cybersecurity Terminology
What role do many computers play in data transmission?
They act as hosts involved in the transmission.
p.12
Browser and Connection Safety
What is the purpose of HTTPS?
To provide a secure connection with encrypted data transfer between the web server and the user.
p.6
Cybersecurity Terminology
What is authentication?
To verify a user with credentials (e.g., username/password) as the correct person.
p.7
Cybersecurity Terminology
What is a personal concern regarding security threats?
It varies by individual; each person may have different concerns.
p.17
Information Security Measures
What are some examples of natural hazards that can pose threats?
Natural disasters like earthquakes, floods, and storms.
p.17
Information Security Measures
What can cause power supply failures?
Issues like outages, surges, or equipment malfunctions.
p.17
Information Security Measures
How can careless mistakes impact security?
They can lead to data breaches or loss of information.
p.20
Privacy Rights and Legislation
What is data mining?
The process of analyzing large datasets to discover patterns and extract valuable information.
p.14
Browser and Connection Safety
Why is WiFi usually riskier than wired connections?
Because all messages are broadcasted to everyone in the network.
p.6
Cybersecurity Terminology
What is validation in cybersecurity?
To check if something (e.g., an account, an email) is valid or existing.
p.22
Identity Theft and Social Engineering
What is identity theft?
The act of impersonating someone using their personal data.
p.22
Identity Theft and Social Engineering
What types of identities can be affected by identity theft?
Both online and offline identities.
p.22
Identity Theft and Social Engineering
What is a deepfake?
A technology that can create realistic fake videos or audio, potentially stealing someone's face and voice.
p.21
Privacy Rights and Legislation
What question should we ask about cloud service providers?
How much trust should we devote to them?
p.17
Information Security Measures
What security issues can arise at infrastructure service providers?
Vulnerabilities in their systems that can affect clients.
p.1
Digital Footprint and Personal Data
What is the focus of the course ENGG1003/1004?
Digital Literacy and Computational Thinking.
p.12
Browser and Connection Safety
What does HTTPS stand for?
HyperText Transfer Protocol Secure.
p.14
Browser and Connection Safety
What is the risk of having no encryption on a WiFi network?
Messages can be intercepted by anyone on the network.
p.10
Password Management and Security
What type of password is recommended for better security?
A combination of words or a complex sentence that fits the user.
p.19
Digital Footprint and Personal Data
What should you consider about mobile apps?
How much access rights you authorized for different mobile apps.
p.6
Cybersecurity Terminology
What does authorization determine?
The permission on what a user can access (e.g., change a file, or remove some data).
p.19
Digital Footprint and Personal Data
What is a concern related to digital marketing?
Monitoring and censorship.
p.10
Password Management and Security
What are password managers or 'Passkey' systems?
Tools that allow users to sign in using alternative methods instead of traditional passwords.
What is blackmail in the context of cybercrime?
A revenue model by threatening individuals.
p.1
Privacy Rights and Legislation
Why is personal data privacy important in information security?
To protect individuals' sensitive information from unauthorized access and misuse.
p.19
Digital Footprint and Personal Data
What should you check regarding data sharing?
Whether you agreed to your data being shared in the small print.
p.16
Malware and Phishing Threats
What is spoofing in the context of cybersecurity?
Pretending to be other sites you expect.
p.21
Privacy Rights and Legislation
What should individuals consider regarding their actions?
Think carefully for our own actions.
p.17
Information Security Measures
What personal issues can lead to security threats?
Stress, distractions, or personal crises affecting focus.
p.2
Digital Footprint and Personal Data
What could happen if you lost access to your digital information?
You may lose important assignments, memories, and connections.
What should users verify regarding websites?
Whether it is the expected website.
p.4
Information Security Measures
What do information security policies and practices aim to achieve?
To establish guidelines for protecting information assets and ensuring compliance.
p.9
Password Management and Security
What is a risky practice regarding password storage?
Saving or writing down passwords next to account details.
p.18
Privacy Rights and Legislation
Who should ideally be able to read your sensitive data?
Only you and authorized individuals.
p.18
Privacy Rights and Legislation
Who are actually able to read your sensitive data?
Various entities, including companies and potentially unauthorized individuals.
p.11
Two-Factor Authentication (2FA)
Where is 2FA commonly used?
Online banking, shopping, computer login, and various services.
p.20
Privacy Rights and Legislation
What is the Personal Data (Privacy) Ordinance in Hong Kong?
Legislation that governs the collection, use, and handling of personal data in Hong Kong.
p.2
Digital Footprint and Personal Data
What are the implications of losing control over your digital data?
Someone else could misuse your personal information or impersonate you.
p.5
Cybersecurity Terminology
What is a potential negative aspect of technology?
It enriches the opportunity to cheat unsuspecting people.
p.5
Information Security Measures
What is essential to ensure the control of your data?
Implementing security measures.
p.10
Password Management and Security
How can extra symbols and numbers affect password strength?
They can help enhance password complexity.
p.21
Privacy Rights and Legislation
What is one way privacy theft can occur?
Unauthorized use or release by 'insiders'.
p.15
Browser and Connection Safety
What is one benefit of using a VPN?
It provides an extra layer of connection and potential extra encryption.
p.17
Information Security Measures
What are organizational threats?
Risks arising from internal policies, culture, or management.
p.20
Privacy Rights and Legislation
What is the EU's General Data Protection Regulation (GDPR)?
A comprehensive data protection law that governs how personal data is collected and processed in the EU.
p.9
Password Management and Security
What are two common mistakes people make when creating passwords?
Setting too simple or too short passwords.
p.4
Cybersecurity Terminology
Does this course cover the technical aspects of hacking?
No, it does not cover the technical aspects of hacking and professional defense.
p.12
Browser and Connection Safety
What information can you find in the certificate of the CUHK website?
Details about the server's identity and trustworthiness.
p.10
Password Management and Security
What is a passwordless system?
A system that allows users to sign in using other means, such as biometric devices.
p.21
Privacy Rights and Legislation
What can lead to accidents in privacy theft?
Accidents by service providers.
p.20
Privacy Rights and Legislation
What is secondary use of data?
Using personal data for purposes other than what it was originally collected for.
p.11
Two-Factor Authentication (2FA)
What is the purpose of Two-Factor Authentication?
To provide extra security beyond a plain password.
p.11
Two-Factor Authentication (2FA)
What are the components of a valid 2FA combination?
Knowledge factor, possession factor, inherent factor, and location-based factor.
p.17
Information Security Measures
What types of hazards can fire and water pose?
They can damage physical infrastructure and data storage.
What does libel mean in cyberspace?
Abuse of freedom of speech.
p.20
Privacy Rights and Legislation
What does 'the right to be forgotten' entail?
The right for individuals to have their personal data deleted upon request.
p.20
Privacy Rights and Legislation
What is informed consent?
The process of obtaining permission from individuals before collecting or using their personal data.
p.20
Privacy Rights and Legislation
What role does the Privacy Commissioner for Personal Data play?
Oversees and enforces data protection laws in Hong Kong.