CGS2060 Ch. 5: Computer Security
A small text file of information created by websites you visit that your web browser stores on your hard disk is called a what?
Cookie
A deliberate misuse of computers and networks using malicious code to modify the normal operations of a computer or network is called a what?
Cyberattack
What does DDoS stand for?
Distributed Denial of Service
A form of spyware that records all actions typed on a keyboard is called a what?
Keystroke logger
When this is activated, it saves all keystrokes for subsequent transmission to the virus creator.
Keystroke logging Trojan
A virus that is written in a macro language and placed within a document or a spreadsheet is called a what?
Macro virus
This was developed by Cisco and is used by firewalls, routers, and computers that are part of a network and are connected to the internet, providing a type of firewall protection by hiding internal IP addresses.
Network Address Translation (NAT)
Do Trojans replicate themselves?
No
Annoying software programs that can slow down the operations of a computer, clog email inboxes, and lead to the theft of information and money (i.e. spam, spyware, phishing/pharming, trolling/spoofing) are called what?
Online nuisances
Specialized hardware or software that captures packets transmitted over a network are called what?
Packet Sniffers
This element of a firewall inspects each packet leaving or entering a network and either accepts or rejects it based on a predetermined set of rules.
Packet filter
These are stored on the hard drive and are not lost when the browser is closed, and collect info about user preferences, username and password info, IP addresses, and web surfing behavior.
Persistent Cookies
A type of phishing that seeks to obtain personal information through malicious software that is deposited on a victim's computer, redirecting the user to a phony web page, is called what?
Pharming
This process tricks users into revealing usernames and passwords by appearing legitimate.
Phishing
This element of a firewall intercepts all messages between a client and server and helps avert a hacker or other intruder from attacking a network.
Proxy server
If antivirus software cannot remove a found virus, it will send the file to an isolated area on the hard drive called a what?
Quarantine
When this is activated, it encrypts files on a user hard drive and then sells a decryption program.
Ransomware
This type of malware hides in the operating system, and is triggered each time you boot your computer.
Rootkit
Computer viruses typically must be _____ to attack and do damage.
Run
This term describes individuals who try to illegally gain access to computer systems using programs that others have written, as they lack the skill to write their own.
Script Kiddies
Files that are stored in temporary memory and are lost when the web browser is closed that collect info about the start and end of a browsing session, analyze and measure web traffic, and determine the browser being used are called what?
Session cookies
What are the two common types of cybercrimes?
Single event, on-going series of events
An unsolicited email message, sometimes called UBE (unsolicited bulk email), is called what?
Spam
Software that collects information about your Internet surfing habits and behaviors, including keystrokes, passwords, and confidential information, is called what?
Spyware
A program that appears to be legitimate but executes an unwanted activity when activated is called a what?
Trojan horse
If you receive a phishing message, you should report the incident to what organization?
US-CERT
The software code of a particular virus, detected by an antivirus software's database, is called a what?
Virus signature
These individuals are non-malicious computer security experts that test the security measures of an organization's information systems to ensure they are protected against intrusions.
White Hat Hackers
A destructive program that replicates itself throughout a single computer or network is called a what?
Worm
Do worms attack both wired and wireless networks?
Yes
Software that collects the user's web browsing history and subsequently creates unsolicited pop-up advertisements is called what?
Adware
Opening an infected email attachment, downloading an infected file from the internet, sharing infected files, or visiting a contaminated website are all ways to contract a what?
Computer virus
Software that infects computers and is created using computer code is called a what?
Computer virus
Harming or harassing a person or group via information technology and networks in a repeated, deliberate manner is called what?
Cyberbullying
Criminal activity committed within a computer, including cyberespionage, information theft, data manipulation, cyberbullying, and data corruption is collectively called what?
Cybercrime
Cyberbullying is also known as what?
Cyberstalking
A ______ uses computers and the internet to launch attacks against computer systems for political or ideological reasons.
Cyberterrorist
A ____ attack launches viruses on computers, causing them to act as zombies and work together to send out legitimate messages, creating huge volumes of network traffic resulting in a crash.
DDoS
What does DoS stand for?
Denial of Service
A _____ is an attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests.
DoS
In order to maximize security, NAT should be used in conjunction with the router or OS's what?
Firewall
A person who gains unauthorized access to networks in order to steal and corrupt information and data is called a what?
Hacker
Malware is short for what?
Malicious software
This is designed to steal information, destroy data, impact the operations of a computer or network, or frustrate the user.
Malware
Name 3 types of malware.
Viruses, worms, Trojan horses
These destructive programs exhaust network bandwidth or available storage through replication.
Worms