Connect Ch 5 Security
categorize other computer terms
first party cookies/ software/ hardware
trojan horse virus
program that appears legit, but executes an unwanted activity when activated is called
TTP stands for
trans-pacific partnership
phishing
tricks users into revealing usernames and passwords by appearing legit
spam filters search for spam by watching for keywords and by monitoring suspicious ___ patterns and frequencies
word
a hacker launches an attack on a network that is designed to interrupt and stop network traffic by flooding it with too many requests. this would be considered what kind of attack?
DoS Attack
who should you notify if you receive a phishing message
US Cert
cybercrime
a crime in which a computer is the object of the crime and is used to commit a criminal offense
b2c
business to consume
derived from the greek word ergon and homi, _________________ is an important element of workplace safety
ergonomics
botnet
group of compromised computers controlled by a hacker
categorize into virus
macro, trojan horse, and worm
experts suggest using password ____________ software to keep your passwords safe
management
categorize into cyberattack
packet analyzer, rootkit, and DOS attack
which are considered intellectual property?
patents/ trade secrets/ trademarks
adware often accompanies downloaded _____________
programs
rootkits
software programs that hide in the operating system and allow for the installation of hidden files
adware
software that collects a users web browsing history to create unsolicited targeted pop-up ads
spyware
software that collects information about your internet surfing habits and behaviors, includes the collection of passwords, account numbers, and keystrokes
packet sniffers
specialized hardware/software that capture packets transmitted over a network
which of the following are online nuisances
spoofing/ spyware/ spam
the title in the DMCA that directly impact digital copyright issues
title 1- WIPO copyright and phonograms treaties and implementation act title 2- computer maintenance compensation assurance title 3- online copyright infringement liability limitation
hacktivating
category of cyberterrorism that focuses on hacking computer systems for politically/ socially motivated purposes
after youve clicked on the privacy tab in safari which of the following are ways to efficently remove cookies and stored data
click remove all web site data or click details then select one or more website, then click remove
an internet filter can be installed on which
computer / router / server
c2c
consumer to consumer
digital identity
digital presence created online by an individual or organization using a digital device
keystroke logger
form of spyware that records all actions typed on a keyboard
internet privacy is a wide hanging term that refers to a variety of considerations including:
how data and information is used, techniques and technologies used to protect sensitive and private data, communications and preferences of who has access to data or information
what is true about trojan malware
often used to find passwords/ destroy data/ bypass firewalls/ often found attached to free downloads and apps/ similar to viruses but do not replicate themselves
cyberterrorist
person who uses computers and the internet to launch attacks against computer systems for a political or ideological reason
typically computer viruses must be what to attack and do damage to a digital device?
run
select the functions of session cookies
determine web browser being used/ analyze and measure traffic on a web page/ determine the start and end of a session
categorize hackers
black hat/ script kiddie/ white hat/ cyberterrorist
black hat hacker
breaks into computer systems with the intent of causing damage or stealing data
white hat hackers
computer experts that attempt to hack into a network to ensure that it is protected against intrusions
antivirus software
computer program that scans files to identify and remove computer viruses and other malicious programs is called
third party cookie
created by a website other than the one you are currently visiting and are used to track your surfing habits and are considered a violation of privacy
intellectual property
human knowledge and ideas that the law protects against unauthorized use by oters
what is true about script kiddies
illegally gain access to computer systems using programs that others have written/ amateur computer hackers with little programming experience
proxy server
intercepts all messages between client and server to help alert a hacker or other intruder from attacking a network.
ransomeware
malware that encrypts a computers data, forcing the victim to purchase a decryption code
developed by cisco and used by firewalls, routers, and computers that are part of a network and are connected to the internet, __________________________ provides a type of firewall protection by hiding the internal IP addresses
network address translation
on what date does the liability of paying for the fraud falls on the party that is least chip-enabled?
october 1, 2015
If your debit card has been compromised U.S. Federal law says you are only liable for a maximum of _____ in fraudulent charges if you tell your bank within two business days of learning about them.
$500
according to microsoft, what is the correct order of steps to accept all cookies in internet explorer
1. open internet explorer 2. click tools icon 3. click internet options 4. click privacy tab 5. under settings, move the slider to the bottom to accept all cookies 6. click apply
steps for parental controls in microsoft windows
1. open parental controls 2. click the standard user account that you want to set parental controls for 3. under parental controls click "on" then enforce current settings 4. adjust time limits, access to certain programs and websites.
steps of a virus infection in the correct order
1. the virus arrives via email attachment, file download, or by visiting an infected line 2. an action such as running or opening the file triggers the virus 3. the payload is activated and the virus starts its destructive activities
the TTP covers just under ____ percent of global GDP
40
according to the FTC, a few united states internet privacy rules/laws of importance are
COPAA and Red flags rule
passports issued by the us and many other countries include
RFID chips
cyberattack
a deliberate misuse of computers and networks via the internet that uses malicious code to modify the normal operations of a computer or network
on a mac home screen, where do you click to access to adjust parental control settings
apple and settings
on a mac home screen, where do you click to access to adjust parental control settings?
apple and settings
DoS
attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests.
b2b
business to business
after you've clicked on the privacy tab in safari, which of the following are ways to efficiently remove cookies and stored data
click remove all web site data, or click details then select one or more websites, then click remove
whats true about spyware
collects information about your internet surfing habits and behaviors/ includes the collection of keystrokes, passwords, and confidential info/ installed via free downloads or by visiting certain illegitament websites
you can change your firefox settings to allow you to
delete stored cookies automatically when you start firefox/ deny cookie storage requests / approve cookie storage requests
symptoms your system has been hacked
fake emails/ social media messages from your account/ redirected internet searches/ unwanted browser tool bars
True or false ; international laws on internet privacy are very similar
false
the main government organization that oversees internet privacy in the us is the
federal trade commission FTC
what is true about macro viruses
initiated by downloaded and opening an infected attachment/ commands in the macro language set off the destructive actions/ when file is opened the macro virus expands
which of the following are ways to prevent computer virus infections?
install latest antivirus software and update frequently/ downloaded content from the web should only come from trusted sites/ web surfing should be limited to trusted sites
categorize online nuisance
phishing/ spoofing/ spyware/ trolling
in the options tab in mozilla firefox, where would you click to adjust cookie settings
privacy-history area
categorize digital identity
purchasing behavior/ social media postings/ online search activities
Once the virus is identified the antivirus software attempts to remove the virus from the file. If the software cannot remove the infected file it will send the file to an isolated area on the hard disk called _____.
quarantine
which of the following are common email viruses
randomware / phishing / keystroke- logging trojan
stored in temporary memory _____________________ are used to analyze and measure traffic on a webpage
session cookies
the software code of a particular computer virus is called the virus
signature
first party cookie
small text file of information created by a website you visit that keeps track of your personal preferences and current web browsing session
web cookie
small text file of information created by websites you visit that your web browser stores on your hard disk
categorize online nuisances
spam/ spyware/ adware
malware is designed for
stealing information, incapacitate a computer or network, and to destroy data
persistent cookie
stored on a users hard drive, a type of cookie that collects information about user preferences, password, and username information, ip addresses, and data on a web surfing behavior
categorize internet privacy
techniques and technologies used to protect sensitive data and information/ how data and information is used/ who has access to data and information
internet privacy
the right of personal privacy concerning the storing, distributing and displaying information concerning oneself via the internet
internet privacy
the right of personal privacy concerning the storing, distributing, and displaying information concerning oneself via the internet is called
true or false: if you adjust cookie settings in chrome your cookie settings in firefox are automatically adjusted to match those of chrome
true
the digital millenium copyright act was signed into law by president clinton in 1998. the act implements
two world intellectual property organization treaties
worm
type of malware that replicates itself throughout a single computer or across a network
rootkit
type of malware triggered each time you boot your computer
pharming
type of phishing that seeks to obtain personal information through malicious software that is inserted on victims computers and directs them to fake webpages
system security area that is accessed by clicking the control panel > system and security. when you click windows firewall, what are some of the firewall settings you can adjust?
update firewall settings / turn windows firewall on or off/ change notification settings
which are protected by intellectual property law against unauthorized user distribution?
video games and movies
which are protected by intellectual property laws against unauthorized clear distribution?
video games and movies
macro virus
virus written in a specific language and placed within a document or spreadsheet
one of the risks with cookies
websites using cookies can collect your information an sell it to 3rd parties
keystroke - logging trojan
when activated, saves all keystrokes for subsequent transmission to virus creator
steps to set parental controls on MAC OS
1. select system preferences, then click parental controls 2. click the lock icon to unlock it, then enter an administrator name and password 3. select a user, then click enable parental controls 4. if the user is not on the list, click add, then fill in the name, account, and password information to create a new user
under the TTP, copyrighted works will pass into the public domain how many years after the creators death?
70