ICT CyberSecurity - v3.0 - L01 - Clozed Notes
ICT CyberSecurity - v3.0 - L01 - Clozed Notes
1. Privacy is the state of being free from being ____________ or disturbed. It is the right to keep one’s
personal information ____________.
2. ____________ of privacy is the act of intruding on a person’s life without permission.
3. Technology can ____________ a person’s Internet activity without the person’s knowledge or permission.
4. Personal identifiable information (____________) is data that can directly identify a person.
5. Cybercriminals will use PII to commit a ____________.
6. Online privacy is measured by the amount of protection being used to protect a user’s ____________
and ____________ usage.
7. Online privacy is affected by:
a. Data collected by ____________ forces of the Internet.
b. Data a user ____________ while on the Internet.
c. Data collected with or ____________ a user’s knowledge.
8. Online retail stores collect data to create a personalized ____________ experience.
9. Government collects data to ____________ crime.
10. Business tracks data to improve ____________ service.
11. Service provider tracks data to ____________ technical problems.
12. Games track data to ____________ the game’s performance.
13. Radio and TV track data to identify ____________ programs.
14. Social media apps track data to improve targeted ____________.
15. A user provides data to a company when they create a user account or submit a ____________ form.
16. A ____________ tracks a user’s location.
17. A ____________ tracks a user’s browsing history.
18. A ____________ assistant tracks purchasing behaviors.
19. Browser ____________ tracks browser activity.
20. Cell phone triangulation tracks location information by pinpointing the location of the ____________
device.
21. Terms of Service is a legal document that describes the ____________ the company and user agree to
and obey.
22. Privacy Policy is a ____________ document that describes what information is being collected, how the
information will be used, and how the collected information is being protected.
23. A Privacy Policy is legally ____________ and is found on websites and apps.
24. Data on users is ____________.
25. Data analysts study data to ____________ users; it helps them make ____________ decisions on the user
experience.
26. Advertising uses collected data to ____________ an advertisement to a certain demographic.
27. Collected data is sometimes ____________ to an organization that can’t collect data.
28. Cybercriminals will use collected information to ____________ into a device or ____________ a person’s
identity.
29. A ____________ is an event when digital data is stolen by hacking.
30. A digital footprint is a ____________ of a user’s online activity. It can be thought of as a digital trail.
31. Know what your digital ____________ says about you.
32. The Internet ____________ forgets…not even deleted data.
33. Clean up your digital footprint by:
a. Reviewing posted content on all your apps.
b. Removing any ____________ information.
c. Remove any information that should be kept private.
d. Research ____________ online.
e. Ask others to remove posts about you.
f. Change privacy settings on posts of you.
g. Use data ____________ tools.
34. Cybersafety involves using ____________ methods to keep you and your data safe.
35. Cybersafety best practices include:
a. ____________ the privacy policy for each app or website.
b. ____________ privacy settings.
c. ____________ sharing PII data.
d. Always ____________ a website or app.
e. ____________ cookies.
f. ____________ browser history.
g. Use browser ____________.
h. Use a ____________ search engine.
i. ____________ a link before clicking.