CS chapter 9
cookies
-small text files that some websites automatically store on your hard drive when you visit them -provide websites with information about your browsing habits, such as the ads youve opened, the products youve looked at and the time duration of your visits
zombie
a computer that a hacker controls in the back door programs manner is refereed to as this ____. they are often used to launch denial -of-service attacks on other computers
surge protector
a device that protects your computer against power surges
biometric authentication device
a device that reads a unique personal characteristic such as a finger print of the iris pattern in your eye and converts its pattern to digital code
personal firewall
a firewall specifically designed for home networks
botnet
a large group of software programs(called robots or bots) that suns automatically on zombie computers. some have been known to span 1.5 million computers
geotag
a piece of data attached to a photo that indicates your latitude and longitude when you took the photo
virus signature
a portion of the virus code thats unique to a particular computer virus.
packet analyzer (sniffer)
a program deployed by hackers that looks at each packet as it travels on the internet- not just those addressed to a particular computer but all packets coming across a particular network
trojan horse
a program that appears to be something useful or desirable, like a game or screen saver, but while it runs, it does something malicious in the background, without you knowing
script
a series of commands - actually a miniprogram - that is executed without your knowledge . often used to perform useful, legitimate functions on websites, such as collecting name and address information from customers.. some are malicious
firewall
a software program or hardware device designed to protect computers from hackers. named after housing construction feature that slows the spread of fires from house to house
scarware
a type of malware that downloads onto your computer and tries to convince you that your computer is infected with a virus or other type of malware
macro virus
a virus that attaches itself to a document that uses macros
time bomb
a virus that is triggered by the passage of time or on a certain date
kburra.com
also can help you monitor cookies
cybercrime
an criminal action perpetrated primarily through the use of a computer. the existence of this means that computer users must take precautions to protect themselves
pendrivelinux.com
an excellent resource that offers many different versions of linux for download and includes step by step instructions on how to install them on your flash drive
spam filter
an option you can select in your email account that places known or suspected spam messages to a special folder
download.com
anti spyware programs that are easy to install and update
logical ports
are virtual - that is not physical - communications gateays or paths that allow a computer to organize requests for information =, such as web page downloads or email routing, from other networks or computers. you cant see or touch this, its a part of the computers internal organization
network address translation (NAT)
assign internal IP addresses on a network. the internal IP addresses are used only on the internal network and therefore can t be detected by hackers
white-hat hackers
break in to systems for non malicious reasons, such as to test system security vulnerabilities or to expose undisclosed weaknesses
black- hat hackers
break into systems to destroy information or for illegal gain
polymorphic virus
changes it own code or periodically rewrites itself to avoid detection. infect a particular type of file such as .EXE files for example
symatec.com
conton archives of information on viruses and provide information on viruses and provide step by step solutions for removing them
backups
copies of files that you can use to replace the originals if theyre lost of damaged
cyberfloating
cyber slacking, means using your computer for non work activities while youre being paid to do your job
multipartite virus
designed to infect multiple file types in a effort to fool the antivirus software that is looking for it
absolute.com / brigadoonsoftware.com
enables your computer to alert authorities to the computers location if it is stolen
network attached storage NAS devices and home servers
essentially large hard drives connected to a network of computers instead of one computer and they can be used to back up multiple computers simultaneously
program files
files used to install software, usually found on DVDs or downloaded from the internet. as long as you have the DVDs in a safe place, you shouldnt need to back up these program files
data files
files youve created or purchased, such as research papers, spreadsheets, music , and photo files, contact lists, address books, email archives and your favorites list from your browser
logical port blocking
firewalls are often configured to ignore requests that originate from the internet asking for access to certain ports
packet filtering
firewalls can be configured so that they filter out packets sent to specific logical ports in a process known as ____.
onedrive.com / adrive.com
free storage options
whole house surge protector
function like surge protectors, but they protect all electrical devices in the house
ftc.gov
has identified other methods thieves use to obtain others personal information
encryption viruses
infect your computer, they run a program that searches for common types of data files, such as microsoft word and excel files, and compresses them using a complex encryption key that renders the files unusable
incremental backup
involves backing up only files that have changed or have been created since the last back up was performed
pretexting
involves creating a scenario that sounds legitimate enough that someone will trust you
computer forensics
involves identifying extracting, preserving and documenting computer evidence.
distributed denial of service (DDoS) attack
launches DoS attacks from more than one zombie at the same time
denial of service(DoS) attack
legitimate users are denied access to a computer system because a hacker is repeatedly making requests of that computer system through a computer he or she has taken over as a zombie
phishing
lures internet users to reveal personal information such as credit card numbers, social security numbers, or other sensitive information that could lead to identity theft
drive-by download
many viruses exploit weaknesses in operating systems. malicious websites can be set up to attack your computer by downloading harmful software onto your computer. this is known as ____
image backup or system backup
means that all system application, and data files are backed up, not just the files that changed
keystroke logger (key logger)
monitors keystrokes with the intent of stealing passwords, log in IDs, or credit cards information
hacker
most commonly defined as anyone who unlawfully breaks into a computer system - either an individual computer or a network
pharming
occurs when malicious code is planted on you computer, either by viruses or by your visiting malicious websites, which then alters your browsers ability to find web addresses
data breach
occurs when sensitive of confidential information is copied, transmitted or viewed by an individual who isnt authorized to handle the data
ipvanish.com
offer features such as government-grade encryption of data, enhanced email and anonymous web surfing
Backdoor Programs and Rookits
programs that allow hackers to gain access to your computer and take almost complete control of it without your knowledge. they can delete all files on your computer, send email and run programs and just about anything else that you can do with your computer
iron key.com
provide an even higher level of surfing privacy. simply plug in the device into an available USB port on the machine in which you are using, all history and browser caches will be stored on the privacy device, not on the computer you are using
ibackup.com / carbonite.com
provide larger back up storage for a fee
malware
software that as malicious intent
adware
software that sponsored advertisements in a section of your browser window or as a pop-up box. considered legitimate though sometimes annoying, means of generating revenue for those developers who do not charge for their software or information
antivirus software
specifically designed to detect viruses and protect your computer and files from harm
fbi.gov/about-us/investigate/cyber/cyber
specifically to inform the public about types of cyber crimes and methods of protecting yourself
quarantining
stops the execution of the file and virus and notifies you that it has detected a virus. its also places the virus in a secure area on your hard drive so that it wont spread to other files
stealth virus
temporarily erase their code from the files where they reside then hide in the active memory of the computer
rockyou.com
the Imprava Application Defense Center, a computer-security research organization, conducted a review of 32 million passwords that were used at this website
inoculation
the antivirus software records key attributes about your computer files, such as a file size and data created, and keeps these statistics in a safe place on your hard drive
grc.com
the companies ShieldsUP and Leak Test programs are free and easy to run and can pinpoint security vulnerabilities in a system connected to the internet
versaforward.com / sneakemail.com
these services screen your email messages, forwarding only those messages you designate as being okay to accept
spam
unwanted or junk email - find your email address either from a list the purchased or with software that looks for email address on the internet
email viruses
use the address book in the victims email system to distribute the virus
annualcreditreport.com
website to go to and look for and reports that have suspicious activity
spear phishing
when cybercriminals obtain data on individuals that includes information about which companies those individuals have a relationship with, they can engage in much more targeted attacks know as ____.
passwordmeter.com
you can use this site to evaluate your passwords. provides guidelines for good passwords and shows you how integrating various elements such symbols affects the strength score of your password
grey hat hackers
a bit of a cross between black and white hat hackers, they often illegally break into systems merely to flaunt their expertise to the administrator of the system they penetrated or to attempt to sell their services in repairing security breaches
virus
a computer program that attaches itself to another computer program and attempts to spread to other computers when files are exchanged