Chapter 3— Computer Security
A person who harms or harasses via information technology and networks in a repeated and deliberate manner is called a ___________.
Cyberbully
A computer program that scans files to identify and remove computer viruses and other malicious programs is called _____________.
Antivirus software
Worms:
Automatically reproduces itself.
What type of cookie is stored in temporary memory and is lost when the web browser is closed?
Session
Network _______ Translation (NAT) provides a type of firewall protection by hiding internal IP addresses.
Address
Online nuisances:
Adware, spyware, and spam
Black hat hackers
Break into computer systems with the intent of causing damage or stealing data.
White hat hackers
Computer experts that attempt to hack into a network to ensure that it is protected against intrusions.
A deliberate misuse of computers and networks, ___________ use malicious code to modify the normal operations of a computer or network.
Cyberattacks
A crime in which a computer is the object of the crime or is used to commit a criminal offense is called _________.
Cybercrime
What does DDoS stand for?
Distributed Denial of Service
A category of cyberterrorism that focuses on hacking computer systems for politically or socially motivated purposes is ___________.
Hacktivism
Overheating, humidity, and magnetic fields can cause damage to the _____________ of a digital device.
Hardware
Firewall software used to block a user's access to specific Internet content is called a(n) _________ filter.
Internet
A form of spyware that records all actions typed on a keyboard is called a _________ logger.
Keystroke
What is true about packet sniffers?
Legitimate sniffers are used for routine examination and problem detection and unauthorized sniffers are used to steal information.
Malware is short for ____________ software.
Malicious
Experts suggest using password __________ software to keep your passwords safe.
Management
Initially, the United States Computer Emergency Readiness Team (US-CERT) determined that these 2 vulnerabilities would necessitate replacing a significant number of Intel and AMD computer processors.
Meltdown and Spectre
The technology that provides a type of firewall protection by hiding internal IP addresses is called _________.
NAT
Typically computer viruses must be _________ to attack and do damage to a digital device.
Opened
Creating a fake webpage to trick victims into divulging personal information is a type of phishing known as __________.
Pharming
What type of server intercepts all messages between client and server to help avert a hacker or other intruder from attacking a network?
Proxy
Once the virus is identified the antivirus software attempts to remove the virus from the file. If the software cannot remove the infected file it will send the file to an isolated area on the hard disk called _____.
Quarantine
A type of malware that is triggered each time you boot your computer is called a ___________.
Rootkit
Software programs that hide in the operating system and allow for the installation of hidden files are called:
Rootkits
If you notice you are receiving fake antivirus messages, power down your computer and reboot your computer in ___________ mode.
Safe
Specialized hardware or software that captures packets transmitted over a network are called packet ________
Sniffers
DeSean received an unsolicited email message from an unknown sender. This email was __________.
Spam
Ted installs computer software designed to prevent spam messages from entering his email inbox. This type of software is called a _________ filter.
Spam
Software that collects information about your Internet surfing habits and behaviors is called __________.
Spyware
What's true of script kiddies?
They illegally gain access to computer systems using programs (scripts) that others have written and they are typically amateur computer hackers with little programming expertise.
Often accompanying downloaded music or apps, programs that appear to be legitimate, but executes an unwanted activity when activated is called a __________.
Trojan
Spam messages are sometimes called ________ and are used for a variety of marketing purposes including selling products and services.
UBE
Sharing infected files and opening an infected email attachment are ways that a computer _________ can infect a digital device.
Virus
Ransomware:
When activated, encrypts files on user hard drive and then sells a decryption program.
A type of malware that replicates itself throughout a single computer or across a network is called a __________.
Worm
Mary uses computers and the internet to launch attacks against computer systems for political or ideological reasons. Mary is considered a cyber-___________.
terrorist