CGS 2060 Computer Security
Diagnosing a hacked system
-Fake antivirus messages -Unwanted browser toolbars -Frequent random fake emails or social media messages from your account.
virus infection options
-Opening an infected Email attachment -Downloading an infected file from the Internet -Sharing infected files -Visiting a contaminated Web site
Worm
A destructive program that replicates itself throughout a single computer or across a network. -both wired and wireless
On-going series of events
More serious than single event cybercrimes. On-going series of events include cyberstalking, child predation, extortion, blackmail, and terrorist activities.
Packet Sniffer
Specialized hardware or software that capture packets transmitted over a network.
Single Event
Victims endure a single event cybercrime such as unknowingly downloading a Trojan horse virus, installing a keystroke logger, phishing, theft or manipulation of data via hacking or viruses, identity theft, or e-commerce fraud
Keystroke logger
a form of spyware that records all actions typed on a keyboard -can be hardware or software
Hacker
a person who gains unauthorized access to networks in order to steal and corrupt information and data.
Cookie
a small text file of information created by websites you visit that your web browser stores on your hard disk.
rootkit
a type of malware that is triggered each time you boot your computer. -allows the instillation of hidden files and hide in OS
Pharming
a type of phishing that seeks to obtain personal information through malicious software that is deposited on a victim's computer.
Macro virus
a virus that is written in a macro language and placed within a document or spreadsheet.
DoS(Denial of Service)
an attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests.
Spam
an unsolicited email message
Online nuisances
annoying software programs that can slow down the operations of a computer, clog email inboxes, and lead to the theft of information and money. -spam -spyware -phish/pharm -troll/spoof
Trojan
appears legitimate, but executes an unwanted activity when activated.
Persistent Cookie
are stored on the hard drive and are not lost when the web browser is closed. -collect information about user preferences, username and password information, IP address, and web surfing behavior. -not lost if no expiry date
Spam Filter
computer software that is designed to prevent spam messages from entering a user's email inbox.
Cyber Crime
criminal activity committed with a computer. -information theft, data manipulation, cyberbullying, and data corruption.
Malware
designed to steal information, destroy data, impact the operations of a computer or network, or frustrate the user
Network Address Translation (NAT)
developed by Cisco and is used by firewalls, routers, and computers that are part of a network and are connected to the Internet -to maximize security it must be used in conjunction with the firewall built into the router
Session Cookie
files that are stored in temporary memory.
Cyberbulling/cyberstalking
harming or harassing a person or group of people via information technology and networks in a repeated deliberate manner.
Phishing
illegitimate use of an email message that appears to be from an established organization such as a bank, financial institution, or insurance company. .
Internet Filters
is firewall software used to block access to specific Internet content.
Firewall
is hardware or software used to keep a computer secure from outside threats such as hackers and viruses. -A packet filter inspects each packet leaving or entering a network and either accepts or rejects it based on a predetermined set of rules. -Proxy Server - Intercept all messages between client and server and help avert a hacker or other intruder from attacking a network.
DDos(Distributed Denial of Service)
launches a virus on a computer. -computers are infected and act as zombies
Cyberattack
operating system may not launch properly, and the computer user may need to reboot and restart the computer frequently to ensure all programs are starting and working fine
Virus Symptoms
operating system may not launch properly, and the computer user may need to reboot and restart the computer frequently to ensure all programs are starting and working fine
Spyware
software that collects information about your Internet surfing habits and behaviors.
Adware
software that collects the user's web browsing history.
Computer Virus
software that infects computers and is created using computer code. -can destroy programs or change network operation
Hactivism
the act of hacking, or breaking into a computer system for a politically or socially
Script riddles
try to illegally gain access to computer systems using programs (scripts) that others have written.
Ransomware
when activated, encrypts files on user hard drive and then sells a decryption program.
Keystroke logging Trojan
when activated, saves all keystrokes for subsequent transmission to virus creator.