Chapter 9 - Study Guide
Be familiar with security suggestions like: strong passwords, authentication, biometrics usage, VPNs, backups, and surge protectors
creating strong passwords—ones that are difficult for hackers to guess—is an essential piece of security that people sometimes overlook biometric authentication device: a device that reads a unique personal characteristic such as a fingerprint or the iris pattern in your eye and converts its pattern to a digital code backup: copies of files that you can use to replace the originals if they're lost or damaged surge protectors: a device that protects your computer against power surges
Differentiate between DOS and DDOS attacks. What are logical ports?
denial of service (DoS) attacks: hackers are repeatedly making requests of that computer system through a computer they have taken over as a zombie distributed denial of service (DDOS) attack: launches DoS attacks from more than one zombie at the same time logical ports: virtual communications paths
What are the types of firewalls discussed in class?
firewall: a software program or hardware device designed to protect computers from hackers software firewall hardware firewall personal firewall
Define identity theft and hacking
identity theft: when a thief steals personal information and poses as you in financial or legal transactions hacking: anyone who unlawfully breaks into a computer system
Define packet filtering, logical ports, virus signature, quarantining, and network address translation
packet filtering: filter out packets sent to specific logical ports logical ports blocking: completely refuse requests from the Internet asking for access to specific ports virus signature: quarantining: network address translation: assign internal IP addresses on a network
What are the different types of hackers discussed in class?
white-hat (ethical) hackers: break in to systems for nonmalicious reasons (testing, or expose weaknesses) black-hat hackers: break into systems to destroy information or for illegal gain gray-hat hackers: they often illegally break into systems merely to flaunt their expertise or sell their services
What is a packet analyzer and who uses it?
a program deployed by hackers that examines each packet and can read its contents
Be familiar with different general malwares: viruses, spyware, and adware such as Trojan horses, worms, botnet, time bombs, logic bombs, boot-sector viruses, and ransomware. pt 2
boot-sector virus: replicates itself onto a hard drive's master boot record master boot record: a program that executes whenever a computer boots up, ensuring that the virus will be loaded into memory immediately, even before some virus protection programs can load logic bomb: a virus that is triggered when certain logical conditions are met time bomb: a virus that is triggered by the passage of time or on a certain date worm: take advantage of file transport methods script: a series of commands that is executed without your knowledge macro virus: a virus that attaches itself to a document that uses macros
Be familiar with social engineering, phishing, pharming, and scareware?
social engineering: any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information. phishing: lures Internet users to reveal personal information such as credit card numbers, Social Security numbers, or passwords that could lead to identity theft pharming: occurs when malicious code is planted on your computer, either by viruses or by your visiting malicious websites, which then alters your browser's ability to find web addresses scareware: a type of malware that downloads onto your computer and tries to convince you that your computer is infected with a virus or other type of malware
What are: spam, keyloggers, and cookies?
spam: unwanted or junk e-mail keyloggers: monitors keystrokes with the intent of stealing passwords, login IDs, or credit card information cookies: small text files that some websites automatically store on your hard drive when you visit them
How do you prevent virus infections? (antivirus, updates, etc. ).
two main ways: installing antivirus software and by keeping your software up to date
Be familiar with different general malwares: viruses, spyware, and adware such as Trojan horses, worms, botnet, time bombs, logic bombs, boot-sector viruses, and ransomware.
virus: a computer program that attaches itself to another computer program, attempts to spread to control your computer: - trojan horse: a program that appears to be something useful or desirable, like a game or a screen saver, but while it runs it does something malicious in the background without your knowledge backdoor program: hackers can access and delete all the files on your computer, send e-mail, run programs, etc. rootkit: a program that gives an outsider remote control over a computer zombie: computer that a hacker controls, used to launch denial-of-service attacks on other computers denial of service (DoS) attacks: legitimate users are denied access to a computer system because hackers are repeatedly making requests of that computer system through a computer they have taken over as a zombie distributed denial of service (DDOS) attack: launches DoS attacks from more than one zombie (sometimes thousands of zombies) at the same time