cyber security terms and terminologies: As you’ve browsed the internet, you’ve probably run into a lot of terms like “phishing” and “malware” and have been unsure what they mean and how they pertain to you. Now, you don’t have to search for a definition that makes sense, as (almost) everything you need to know is right here.
Questions and Answers
My Courses has a large Questions and Answers repository for the most popular High School and Tertiary Schools subjects. This comes in handy when doing your revision or preparing for exams, tests, research tasks, and assignments.
Life Orientation Grade 12
Life Orientation Quiz
[show-quiz id=”31337″ title=”Life Orientation Grade 12 Quiz”]
26 Cyber Security Terms and Terminologies you should know
- Catfishing: Creating a fake identity on a social network account, usually a dating website, to target a specific victim for deception.
- Cyber security: A technique for protecting computers, networks, programs, and data from unauthorized access or hackers for exploitation.
- Data breach: When sensitive, protected, or confidential information is intentionally released to an untrusted environment.
- Data protection: Also known as data privacy and information privacy, the process of safeguarding information so it doesn’t fall into the wrong hands.
Digital security: An all-encompassing term for the tools used to secure your identity, data, assets, and devices.
- Ethical hacking: The practice of locating vulnerabilities and weaknesses in information systems and computers by duplicating the actions and intent of malicious hackers who seek to bypass security and search for gaps in systems that can be exploited.
- Firewall: An internet traffic filter meant to stop unauthorized incoming and outgoing traffic.
- Firmware: Code that is embedded into the hardware of a computer.
- Fileless Malware: Malware operating in-memory.
- Flame: Also known as Flamer, sKyWIper, and Skywiper, a modular computer malware discovered in 2012. It attacks computers running on Microsoft Windows.
- Hacker: A cyber attacker who uses software and social engineering methods to steal data and information.
- Password: A secret word or phrase that is used to access a computer system or service.
- Phishing: The method of obtaining user information through fraudulent communications targeted directly at people. This is usually done through emails disguised as coming from a legitimate source but delivers the target’s information back to the hacker’s actual source.
- Piggyback programs: Programs that are bundled into another program that a user downloads in the hope that the user will select “next” by force of habit and install.
- Plaintext: Text that can be read by the human eye, like this article!
- Plugins: Customizable additions to software for extra functionality.
- Private data: Data that is used to identify you, like your name, address, phone number, or Social Security Number.
- Sandboxing: An effort to increase security by isolating processes and browser tabs from one another and the rest of the computer. .
- Spoofing: An attack in which a person, or program, disguises themselves as another by falsifying data to gain an advantage or the trust of someone else.
- Trojan: A form of malicious software that disguises itself as a harmless computer program but provides threat actors with the ability to execute any variety of attacks that steal
- Virus: Viruses are typically attached to files, applications or downloads that appear to be non-threatening elements. Once downloaded, opened or executed, the virus can piggyback onto programs to corrupt data or expand throughout a network and damage systems across a company.
- White hat hacking: Hacking that is meant to do minimal damage and is usually done out of curiosity.
- Sexting: Sending mass emails or text messages that include nude or degrading photos of the victim.
- Slut shaming: This behaviour involves shaming someone, usually a girl, for the way she dresses, acts or the number of people she has dated.
- Cyber-baiting: Creating an incident that causes another person to become upset or emotional and then record the incident.
- Catfishing: Pretend to be someone else in order to lure an unsuspecting person into a fake relationship.
Life Orientation Free Study Resources
Browse a list of free resources for Life Orientation Grade 12, such as: Previous Question Papers, Study Guides, Notes, Questions and Answers
Suggest practical solutions on how any Five of the youth risk behaviours can be addressed or reduced
Suggest practical solutions on how any Five of the youth risk behaviours can be addressed or reduced:
List of Five Risky behaviours and situations, with practical solutions:
Unsafe attitudes and behaviours: Includes drugs, alcohol use and experimentation, defiance and lying, moodiness and irritability, engaging in unsafe sex.
- Unprotected sexual activities that may lead to unwanted teenage pregnancies and Sexually Transmitted Infections (STIs), Solution: Using a protection when engaging in sexual activities.
- strong addiction of drugs and alcohol, Solution: avoid experimenting with alcohol related drinks, as altimately leads to addiction.
- involvement in illegal works for easy earnings. Solution: stop being influenced by wrong friends who always think of getting involved in illigal works.
- under-age driving, Solution: Parents must put car key away from kids.
- unhealthy dietary behaviours. Solution: having a healthy and balanced lifestyle. This means, eating a balanced diet, getting regular exercise, avoiding tobacco and drugs and getting plenty of rest.
- inadequate physical activity. Solution: making a daily habit of physical activites: getting regular exercise.
Critically evaluate the mechanisms that are enforced to regulate inhumane farming methods
Critically evaluate the mechanisms that are enforced to regulate inhumane farming methods, or the question can be “Suggest strategies that could be considered to minimize the effects of inhumane farming methods”.
Inhumane farming methods Examples
Inhumane farming methods are ways of farming that are cruel to animals. An example is battery or factory farming. This type of farming is the artificial, inhumane practice of packing too many animals, such as pigs and chickens, into small, closed spaces. These animals:
- never see sunlight
- never get fresh air
- move a little bit
- live in discomfort and frustration every day.
These animals are also unhealthy to eat. The reason that they are unhealthy is that they are often diseased and injected with antibiotics and growth hormones.
The mechanisms that are enforced to regulate inhumane farming methods
- Stop consuming factory reared products.
- Using genetic engineering where embryo is formed with the help of stem cells.
- Factory rearing of animals should be banned by government as it is harmful for environment.
Why is it important for Teenagers to investigate and be knowledgeable about risky behaviour
Why is it important for Teenagers to investigate and be knowledgeable about risky behaviour: Life Orientation.
Four Reasons why
- Teenagers need to investigate and be knowledgeable about risky behaviour as this helps them understand the consequences of their decisions and hopefully help them make better choices.
- Teenagers need to investigate and be knowledgeable about risky behaviour because learning more about high-risk behaviour will help them consider lower-risk alternatives instead.
- Teenagers need to investigate and be knowledgeable about risky behaviour because risk behavior is a lifestyle activity that puts a person at increased risk of suffering particular conditions.
- Some teenagers might not even have stable families, thus teenagers themselves need to investigate and eventually become knowledgeable about risky behaviour.
Questions and Answers for Previous Exams Tests and Assignments2 years ago
Describe how Ubuntu fight social challenges
Physical Science Grade 123 years ago
Physical Science Grade 12 Notes pdf for study revision
Setswana Grade 103 years ago
Diane tsa Setswana le ditlhaloso: downloadable pdf
Grade 83 years ago
Grade 8 ems Exam Questions and Answers
English Grade 103 years ago
91 Unique English Speech Topics for Grade 11 | Class 11: Education Resource
Sesotho Grade 102 years ago
Popular Sesotho Idioms: Maele a Sesotho le Ditlhaloso – English Translations
English Grade 102 years ago
My Name Poem by Magoleng wa Selepe: Questions and Answers
Life Sciences Grade 113 years ago
Life Sciences Practical Tasks Grade 11 SBA for all Terms: Education Resource