Itec

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

you can change your Firefox settings to allow you to

- delete stored cookies automatically when you start Firefox -Approve cookies storage requests -Deny cookie storage requests

other computer term

-Software Theft -First Party Cookies -Hardware Theft

singler event

-keystorke logger -trojan horse -phishing

true about packet sniffers

-legitimate sniffers are used for routine examination and problem detection -unauthorized sniffers are used to steal info.

Online Nuisance

-spoofing -Trolling -spyware -phishing

Malware is designed to do which of the following?

-steal info - incapacitate a computer/network -destroy data

parental control in microsoft

1) open 2) click 3)under 4) adjust

setting restriction in MAC OS

1. select system 2.click 3.select a user

A deliberate misuse of computers and networks via the uses malicious code to modify the normal operations of a computer/network

Cyberattack

DDos

Distriute Denial of service

an attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests called

DoS attack

web cookie

Small text file of info. created by website you visit that that your web browser stores on your hard disk

program that appears legitimate, but executes an unwanted activity when activated is called --horse virus

Trojan

spam messages are sometimes called ---- and are used for a variety of marketing purposes including selling products and services

UBE

program scan files to identify

antivirus software

what is true about worms

automatically reproduces itself

software that infects computers and is created using is

computer cirus

crime in which a computer is the object of the crime / used to commit a criminal offense

cybercrime

aperson who uses computers and the internet to launch attacks against computer systems for political/ ideoological reason

cyberterrorist

true about ergo

derived the study a very

fuction session cookie

determine determine analyze

signed by clinton 1988

digital

hardware or software to keep a computer secure

firewall

50dollar

for bank

overheating,humanity

hardware

international law

internet

form of spyware that records all actions typed on keyboard

keystroke logger

hiding ip

nat

Rachel notics that her Facebook account displyas advertisements based on her personal profile and browsing history

online nuisance: adware

Specialized hardware/ software that capture packets transmitted over a network are called

packet sniffers

expert suggest

password management

stored on a user's hard drive, a type of cookie that collects info. about user preferences, password and username info, ip address and data on web surfing

persistent cookie

creating a fake webpage to trick victims into divulging personal info. is a type of phishing

pharming

type phishing that seeks to obtain personal info through malicious software that

pharming

highlight(llegitmate use of an email message collect personal inforamation

phisihing

DMCA signed two

property organization

once the viruses identify

quarantine

one version of this malware encrypts the citims data until a payment is made.

ransomware

protected by intellectual

video games movies

software code of particular

viruses signature

Ransomware

when activated, encrypts files on user hard drive & then sets a decryption program

keystroke-logging trojan

when activated, saves all keystrokes for subsequent transmission to bvirus creator.

spam filters search for spam by watching for key words and by monitoring suspicious ----- patterns and frequencies

word

spam filters search for spam by watching for keywords and by monitoring suspicious --- patterns and frequencies.

word

a computer controlled by a hacker

zombie

online nulsances

-adware -spyware -spam

develop a cisco and used by firewall

address

transaction

business to consumer

passport issued

rfid chips

software that collects info about your internet surfing habits and behaviors

spyware

select what's true about macro viruses

-commands in the macro language set off the destructive events -when file is opened the macro virus executes -initiated by downloading and opening an infected attachment

step adjusting cookie settings

1. choose safari 2.click preference 3. click privacy 4) change cookie

There are a variety of cookie settings that can be adjusted in Google Chrome including

-Deleting cookies -blocking/allowing cookies by default -making exceptions for cookies from specific websites/domains

On-going series of events

-blackmail -cyberstalking

if you believe you have fallen victim to phising scam

-contact the instituition was message was allegedly sent from -contact US-CERT

hacker

-cyberterrorist -black hat -white hat -script kiddles

symptoms that your system has been hacked

-fake emails or social media messages from your account -redirected internet searches -unwanted browser toolbars

online nuisance

-frequent pop-ups while searching the web/working in programs -pop-ups start appearing after visiting unfamiliar sites -receiving a lot of spam emails and bounced back email.

Cyberattacks include:

-identity theft -pharming -DDOS attacks

computer software that is designed to prevent spam messages from entering into a user's email inbox

spam filter

DMCA digital

title2,1,3

main governmental

trade

connsidered intellectual

trademarks patents trade secret

Phishing

tricks users into reveling usernames and passwords by appearing legitimate.

click on the organization below that you should contact if you receive a phishing message

us-cert

virus symptoms

-if a system/network is infected severely, it may even black out/ not even launch the startup process - the operating system may not launch properly, and the computer user may need to reboot and restart the computer frequently to ensure all programs are starting and working fine. -critical files may get deletd automatically , and this can happen periodically or all at once

true about spyware

-includes the collection of keystorkes, passwords and confidential info -intstalled via free downloads or by visiting certain illegitimate websites -collects info about your internet surfing habits and behaviors.

true about passwords

-the term passcode and key are synonyms for pw -pws can be used to secure computers, networks,software,personal accounts and digital devices

ways to catch a computer virus

-visiting questionable internet sites -downloading files from the internet -borrowing a friends usb storage device to save a file.

virus

-you cannot boot your computer -your computer is running slower than usual.

this is window firewall area

1) clicking start button 2. control panel 3. system and security 4/ window firewall

steps to have firefox block cookies from one website

1) go to website 2) right click 3) in the page info 4)underneath set cookies

steps of a virus infection in correct order

1) the virus arrives via email attachment, file download, or by visiting an infected site. 2) action such as running/ opening the file triggers the virus. 3) the payload is activated & virus starts its destructive actions.

you need to adjust cookie and data permission settings in Google chrome

1)click the chrome menu on the browser toolbar then select settings 2) click show advanced settings. in the privacy section , click 3) in the Cookies section change the desired cookiest settings.

According to Mozilla, one of the most effiicient ways to clear cookies in Firefox

1)click the menu button, choose History and then Clear Recent History 2) once you have cleared recent history you should set the time range to clear Everything 3) Click on the arrow next to details to expand list of history items 4) select cookies and make sure that other items you want to keep are selected. close the clear recent history window. 5) click clear.

Software programs that hide in the operating system & allow for the installation of hidden files

rootkits

Computer viruses typically must be ---- to attack and do damage. viruses can destory programs/ alter the operations of a computer/ networks

run

typically computer viruses must be--- to attack and do damage to a digital device

run

internet filter installed

server router computer

stored in temporary memory, ----- cookies are used to analyze and measure

session

typed of cookie is stored in temporary

session

anitiviruses programs uses a variety

signature heuristic

First-party cookie

small text file of info. created by a website you visit that keep track of your personal preferences and the current web browsing session

Third-party cookie

small text file of information created by a website other than the one you are currently visiting and are used to track your surfing habits and are considered an invasion of privacy


Ensembles d'études connexes

Nursing Dosage Calculation Test 1

View Set

Chapter 60 - Assessment of Renal/Urinary System

View Set

Triangle Congruence: ASA Postulate and AAS Theorem

View Set

Chapter 3 Macro/Micro Economics Exam (does NOT cover Chapter 4)

View Set