ITEC

¡Supera tus tareas y exámenes ahora con Quizwiz!

Software that collects the user's web browsing history. This data collected then used to create unsolicited targeted pop up advertisements. Often accompanies downloaded programs

Adware

Computer program used to scan files to identify and remove computer viruses and other malicious programs

Antivirus software

Signature based detection Heuristic based detection Behavioral based detection Cloud based detection

Common antivirus software techniques

Small text file of information created by websites you visit that your web browser stores on your hard disk

Cookie

Websites can collect your info and sell to 3 party Can track surfing behavior and create user profile Monitor web behavior

Cookie privacy risks

A deliberate misuse of networks via the internet

Cyberattack

Pharming Phishing Spamming Spoofing

Cyberattack ex

Use of malicious code to modify the normal operations of a computer or network.

Cyberattacks

A crime in which the computer is the object of the crime or is used to commit a criminal offense

Cybercrime

Cyberespionage Internet scams Information theft Data manipulation

Cybercrimes ex

Uses computers and the internet to launch attacks against computer systems for political and ideological reasons

Cyberterrorist

Computers that have been infected by a virus act as "zombies" and work together to send out illegitimate messages creating huge volumes of network traffic. Can result in network crash

DDoS

Attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests

DoS attack

Phishing Ransomware Keystroke logging Trojan

Email virus ex

Hardware or software used to keep a computer secure from outside threats such as hackers and viruses Allows/Blocks internet traffic in and out of a network or computer Most ideal configuration consists of both hardware and software

Firewall

Protects against worms and hackers

Firewall

Filter all information coming through the internet to your network or computer system

Firewalls

Fake antivirus message Unwanted browser toolbar Frequent random pop ups Fake emails/social media messages

Hacked system

A person who gains unauthorized access to networks in order to steal and corrupt data and info

Hacker

The act of hacking, or breaking into a computer system, for politically or socially motivated purposes

Hacktivist

Firewall software used to block a user's access to specific internet content Can reside in user's computer or router Network Also can be called parental controls

Internet filter

The right of personal privacy concerning the storing, distributing and displaying information concerning oneself via the internet.

Internet privacy

A form of spyware that records all types of actions typed on a keyboard Can be hardware devices and software applications

Keystroke logger

Used for routine examination and problem detection

Legitimate sniffers

A virus written in macro language and placed within a document or spreadsheet Executes when file is opened

Macro virus

Viruses Worms Trojan Horses

Malware ex

Used in firewalls to protect from outside network intrusions by hiding internal IP addresses Must be used in conjunction with firewall provided by router or in the OS

NAT

Developed by Cisco Used by firewalls, routers, computers that are part of a network and are connected to the internet

Network Address Translation (NAT)

Spam Spyware Trolling Spoofing

Online nuisance ex

Annoying software programs that can slow down the operations, a computer, clog email inboxes and lead to the theft of information and money

Online nuisances

Specialized hardware or software that captures packets transmitted over a network

Packet Sniffer

Inspects each packet entering and leaving network

Packet filters

A secret code use to prevent unauthorized access to data and user accounts

Password

Stored on a user's hard drive and collects info about: User preferences Password and username info IP address Data on web surfing behavior

Persistent cookie

Type of phishing that seeks to obtain personal information through malicious software that is inserted on a victims computer Redirects the user to a phony web page

Pharming

The illegitimate use of an email message that appears to be from an established organization such as a financial institution or an insurance company

Phishing

Intercepts all messages between client and server

Proxy server

Steal information Destroy data Incapacitate a computer

Purpose of Malware

Type of malware that hides in the operating system and is triggered each time you boot your computer

Rootkit

Install rogue files Delete files Create "backdoor" to bypass security

Rootkit purposes

Amateur computer hackers with little programming expertise

Script kiddie

Stored in temporary memory and is lost when the browser is closed

Session cookie

Unsolicited email message Sometimes called UBE Messages may malicious programs

Spam

Computer software designed to prevent spam messages from entering into a users' email inbox. Also known as spam blockers Anti-spam utilities

Spam filter

Software that collects information about your internet surfing habits and behaviors. Includes the collection keystrokes, passwords, and confidential information

Spyware

A program that appears legitimate but executes unwanted activity when activated Do not replicate themselves Used to find passwords, destroy date, bypass firewalls

Trojan

Used to steal information

Unauthorized sniffers

Software that infects computer Created using computer code Can destroy or alter programs/ operations of a computer or network

Virus

OS doesn't launch properly Files get deleted or encrypted Strange error messages Documents won't save

Virus symptoms

Destructive program that replicates itself throughout a single computer or across a network Automatically reproduces itself Attacks wired and wireless networks

Worm

A computer controlled by a hacker

Zombie


Conjuntos de estudio relacionados

Les nombres de 0 à 100 (en français de France et en français de Suisse)

View Set

Chapter 15 Sections 1 &2 World History

View Set

CITI social behavior research course quiz

View Set

Small Business Management Chapter 3

View Set