chapter 5

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

A(n) ___ allows users to bypass security controls when accessing a program, computer, or network.

A backdoor allows users to bypass security controls when accessing a program, computer, or network.

Define these terms: botnet, zombie, and bot.

Botnet - or zombie army, is a group of compromised computers or mobile devices connected to a network, such as the Internet, that are used to attack other networks, usually for nefarious purposes Zombie - A compromised computer or device whose owner is unaware the computer or device is being controlled remotely by an outsider. Bot - a program that performs a repetitive task on a network.

List common types of malware. A(n)_____ is the destructive event or prank malware delivers.

Common types of malware include: viruses, worms, Trojan horses, rootkits, spyware, and adware. A payload is the destructive event or prank malware delivers.

define the terms, digital security, computer crime, cybercrime, and crimeware

digital security risk - any event or action that could cause a loss of or damage to computer or mobile device hardware, software, data, information, or processing capability computer crime - any illegal act involving the use of a computer or related devices cybercrime- refers to online or Internet-based illegal acts such as distributing malicious software or committing identity theft crimeware - software used by cybercriminals

Explain how macros can be a security risk

Macros are you supposed to record, save, and then execute a set of keystrokes and instructions repeatedly, and they commonly are found word processing a spreadsheet files.

Define the term spoofing.

Spoofing - a technique intruders use to make their network or Internet transmission appear legitimate to a victim's computer or network. Two common types of sports and skiing are email and IP spoofing.

Describe the damages caused by and possible motivations behind DoS and DDoS attacks.

The damage caused by a DoS or DDoS attack includes: retailers lose sales from customers, news websites and search engines lose revenue from advertisers, and time-sensitive information may be delayed. Repeated attacks could tarnish reputations, causing even greater losses. Hactivists, or those who disagree with the beliefs or actions of a particular organization, claim political anger motivates their attacks. Some perpetrators use the attack as a vehicle for extortion. Others simply want the recognition, even though it is negative.

Identify risks and safety measures when gaming.

Viruses, worms, and malware can be hidden in downloaded game files, mobile apps, email message attachments, and messaging software. Gamers should: check the developer before downloading games or patches; read the permissions notices; exercise caution if the game requires ActiveX or JavaScript or if it must be played in administrator mode; use a firewall; do not share personal information with other gamers whom you meet online.

Differentiate among hackers, crackers, script kiddies, cyberextortionists, and cyberterrorists. Identify issues with punishing cybercriminals.

hackers - although originally a complimentary word for a computer enthusiast, now has a derogatory meaning and refers to someone who accesses a computer or network illegally crackers - someone who accesses a computer or network illegally but has the intent of destroying data, stealing information, or other malicious action script kiddies - has the same intent as a cracker but does not have the technical skills and knowledge cyberextortionists - someone who demands payment to stop an attack on an organization's technology infrastructure cyberterrorists - someone who uses the Internet or network to destroy or damage computers for political reasons Issues surrounding cybercrime laws include the extent of the punishment, whether an action is defamation or free speech and who should be punished, the hacker or those who were hacked. Cybercrime laws vary between states and countries, making it difficult to establish what is illegal. Determining who has jurisdiction over a case can create more legal hassles.

List ways to protect against Internet and network attacks

use antivirus software, be suspicious of unsolicited email attachments, scan removable media for malware before using it, implement firewall solutions, back up regularly


Ensembles d'études connexes

Human Resource Management: Talent Management Process

View Set

BUSINESS LAW BUS 115 Ch. 1, 2, 4, 7, 8

View Set

Constructing Sentences/Phrase/Clause

View Set

BIO 113 - Chapter 3, Part 2 Study Set

View Set

Chem 2A Ch. 3 Atoms and the Periodic Table

View Set

Macro Econ Study Guide Test 1 (MindTap Quizzes/Homework)

View Set