Methods of Securing Information Exercise
describe computer viruses
- a software - can take over an operating system -destroy a computer's programs
which of the following is an example of spear phishing
- an email is sent to employees at a specific company instructed them to click on a link that deploys malware to their device
How do managers use personal computers for their business needs?
- communicating via email - creating and using databases and spreadsheets
The acronym DDoS stands for
- distributed denial of service
tips to avoid falling victim to a social engineering attack
- make sure to research the facts constrained in an email message - slow down and think about the scenario - be mindful of web searches to make sure you are landing on legitimate sites
what is the purpose of social engineering in conjunction with ransomware
- tricks victims into allowing access to data
examples of cybercrimes
- trojan horse viruses - computer hacking - digital identity theft
_______ deliberately modifies the normal operations of a computer or network through the use of malicious code
cyberattack
"white-hat testing" refers to paying hackers to hack into one's own private networks and applications
false
how does a firewall work?
it determines what internet traffic can leave or enter a network or computer
what is a characteristic shared by all devices that can be infected by a computer virus
they are connected to the internet
someone commits a cyberattack when they intentionally use malicious code to modify the normal operations of a computer or network via the internet
true