ITEC 1001- Security
On-going cybercrime events
Blackmail, cyberstalking
An internet filter can be installed on which of the following?
Computer, router, server
Signed into law by President Clinton in 1998, the - Millennium Copyright Act implements two World Intellectual Property Organization (WIPO) treaties.
Digital
Web cookie
Small text file of information created by websites you visit that your web browser stores on your hard disk
A deliberate misuse of computers and networks, - use malicious code to modify the normal operations of a computer or network.
cyberattacks
A type of malware that is triggered each time you boot your computer is called a
root kit
Software programs that hide in the operating system and allow for the installation of hidden files are called
root kits
Stored in temporary memory, - cookies are used to analyze and measure traffic on a web page
session
Computer experts that attempt to hack into a network to ensure that it is protected against intrusions are called - - hackers
white hat
The technology that provides a type of firewall protection by hiding internal IP addresses is called
NAT
Keystroke-logging Trojan
When activated, saves all keystrokes for subsequent transmission to virus creator
An attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a _____ attack.
DoS
Common symptoms of a computer virus
Documents will not save, programs launch on their own
Firewalls
Help protect against worms and hackers
Packet sniffers
Legitimate ones are used for routine examination and problem detection, unauthorized ones are used to steal information
Single event cybercrimes
Phishing, Trojan horse, keystroke logger
Symptoms of online nuisances
Pop ups start appearing after visiting unfamiliar sites, receiving a lot of bounced back emails and spam, frequent pop ups while searching the web or working in programs
Passports issued by the US and many other countries include - chips
RFID
Third party cookie
Small text file of information created by a website other than the one you are currently visiting and are used to track your surfing habits and are considered an invasion of privacy
First-party cookie
Small text file of information created by a website that you visit that keep track of your personal preferences and the current web browsing session
Other computer term
Software and hardware theft, first party cookies
The main governmental organization that oversees internet privacy in the United States is the Federal - Commission
Trade
Phishing
Tricks users into revealing usernames and passwords by appearing legitimate
A program that appears legitimate, but executes unwanted activity when activated is called a
Trojan horse virus
Online nuisances
Trolling, phishing, spyware, spoofing, and spam
Ransomware
When activated, encrypts files on user hard drive and then sells a decryption program
Virus symptoms
You cannot boot your computer, it is running slower than usual
Software that collects a user's web browsing history to create unsolicited targeted pop-up advertisements is called -.
adware
A person who gains unauthorized access to networks in order to steal and corrupt information and data is called a -.
hacker
The right of personal privacy concerning the storing, distributing, and displaying information concerning oneself via the internet is called
internet privacy
A virus written in macro language and placed within a document or spreadsheet is called a
macro virus
Experts suggest using password - software to keep your passwords safe.
management
Stored on a user's hard drive, a type of cookie that collects information about user preferences, password and username information, IP address, and data on web surfing behavior is referred to as a - cookie
persistent
A type of phishing that seeks to obtain personal information through malicious software that is inserted on a victim's computer and directs them to a fake webpage is called _______ .
pharming
What type of server intercepts all messages between client and server to help avert a hacker or other intruder from attacking a network?
proxy
Once the virus is identified the antivirus software attempts to remove the virus from the file. If the software cannot remove the infected file it will send the file to an isolated area on the hard disk called _____.
quarantine
Worms automatically
reproduce themselves
Typically computer viruses must be - in order to attack and do dama
run
The software code of a particular computer virus is called the virus -.
signature
Software that collects information about your internet surfing habits and behaviors is called -.
spyware
Your computer has been attacked and overtaken by a hacker. The hacker has control over your computer and can now use it to launch attacks on other computers and systems. Your computer is now known as a -.
zombie
Developed by Cisco and used by firewalls, routers and computers that are part of a network and connected to the internet, Network - Translation provides a type of firewall protection by hiding internal IP addresses
Address
Which of the following can prevent a virus infection?
Adjust your web browser's security settings to only allow browsing on trusted sites; never bypass your browser's built-in security features
Keystroke logger facts
Can be hardware devices and software applications, can be used to monitor employees, often Trojans installed without the user's knowledge, can record passwords and other confidential knowledge
What two organizations should you report a phishing virus to?
US-CERT, the institution the message was allegedly from