Security - Chapter 5 - ITEC 1001

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Setup an Internet filter in Mac OS X

1. Choose Apple menu - System Preference, click Parental Controls. Note: When you open Parental Controls preferences, if you see the message "There are no user accounts to manage," see Add a managed user. 2. Click the lock icon to unlock it, then enter an administrator name and password 3. Select a user, then click Enable Parental Controls. If the user isn't in the list, click Add, then fill in the name, account, and password information to create a new user

Worm

A destructive program that replicates itself throughout a single computer or across a network. •Automatically reproduces itself •Designed to attack both wired and wireless networks •Replication exhausts network bandwidth or available storage

Keystroke logger

A form of spyware that records all actions typed on a keyboard. •Can be hardware devices and software applications •Software based keystroke loggers are often a Trojan that is installed without the user's knowledge •Keystroke loggers can record passwords and confidential information

DoS Attack

Attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests.

Phishing

Phishing is the illegitimate use of an email message that appears to be from an established organization such as a financial institution, or insurance company. •Often contain the company's logo and identifying information •Use legitimate looking email messages to con a user into giving up private information

Internet privacy

The right of personal privacy concerning the storing, distributing and displaying information concerning oneself via the Internet. A variety of considerations including: •How data is used •Who has access to the data •Techniques and technologies used to protect sensitive and private data, communication, and preferences

Rootkit

Type of malware that hides in the operating system and is triggered each time you boot your computer.

Windows Firewall

You can customize four settings for each type of network location in Windows Firewall. To adjust firewall settings in Windows, follow these steps: 1. Click the Start button 2. Click Control Panel 3. Click System and Security, then click Windows Firewall 4. Adjust Windows firewall settings

Cookie settings in web browsers

•Delete cookies •Block/customize cookies •Allow cookies

Managing Cookies

•Determine what cookie settings are preferred •Cookie settings must be adjusted in each browser you use

How a virus infects a computer

•Opening an infected Email attachment •Downloading an infected file from the Internet •Sharing infected files •Visiting a contaminated Web site •Disguised as images, audio or video files

How to diagnose the effects of online nuisances

•Receiving lots of spam e-mails and bounced back email •Frequent pop-ups while searching the web or working in programs •Pop-ups start appearing after visiting unfamiliar sites

Privacy risks with cookies

•Websites can collect your information and sell it to third-parties •Websites can track your surfing behavior and create a user profile •Corporate and government entities can monitor you Web behavior

Spam Filter

A spam filter is computer software that is designed to prevent spam messages from entering into a user's email inbox. •Spam filters are also known as spam blockers or anti-spam utilities •Spam filters search for spam by monitoring suspicious word patterns and frequencies

Malware

Designed to: •Steal information •Destroy data •Incapacitate a computer or network •Frustrate the user Common types of Malware: •Viruses •Worms •Trojan Horses

Diagnosing a hacked system

•Fake antivirus messages - If you notice these messages, power down your computer and reboot your computer in "Safe Mode." In "Safe Mode" run your antivirus program. •Unwanted browser toolbars •Frequent random pop-ups •Fake emails or social media messages from your account

Set restrictions in Mac OS X

1. Choose Apple menu - System Preferences, then click Parental Controls 2. Click the lock icon to unlock it, then enter an administrator name and password 3. Select a user, then click on of the tabs along the top -Apps -Web -People -Time Limits

A Rootkit allows a remote user to

•Install rogue files •Use and take control of the computer by creating a "backdoor" that bypasses security •Delete files

Avoiding viruses

•Install the latest antivirus software and update frequently •Surf the web and download content safely •Only visit trusted sites •Remove any USB drives, and DVDs before booting your computer •Purchase a new router every other year to ensure you have the latest firewall protections •Adjust your web browser's security setting to allow browsing only on trusted sites •Never bypass your browser's built-in security features

Cyberterrorist

A cyberterrorist uses computers and the Internet to launch attacks against computer systems for political or ideological reasons. •Attacks include the disruption of e-commerce and government sites. The power grid and public utilities have also been targeted

Cyberattack

A deliberate misuse of computers and networks via the Internet. Cyberattacks use malicious code to modify the normal operations of a computer or network. Cyberattacks may include the following: •Pharming and Phishing •Spamming and Spoofing •Spyware •Trojans and Viruses •Identity and Information theft •DoS and DDoS attacks

Password

A secret code use to help prevent unauthorized access to data and user accounts. •Used to secure computers, networks, software, personal account, and digital devices •Only identify the authenticity of the password, not the user •The terms passcode and key code are synonymous for password

E-mail virus

A virus that is attached in a file and sent via e-mail message. When that infected file is opened, the virus infects the computer. 3 common types: •Phishing - tricks users into revealing usernames and passwords by appearing legitimate •Ransomware - when activated, encrypts files on user hard drive and then sells a decryption program •Keystroke logging Trojan - when activated, saves all keystrokes for subsequent transmission to virus creator

Macro virus

A virus written in a macro language and placed within a document or spreadsheet. •When file is opened the macro virus executes •Commands in the macro language set off the destructive events •Can be avoided by not downloading or opening the attachment

Remove cookies or stored data in Safari

According to Apple, the fastest way to remove cookies or stored data in Safari is to: 1. Click Remove All Website Data, or click Details 2. Select one or more websites then click Remove If you remove information stored by a website, the website may not be able to provide services it has provided in the past.

Firewall Options

A firewall is an application that executes different tasks than those executed by antivirus or anti-malware apps. •Firewalls help protect against worms and hackers, antivirus apps help protect against viruses, and anti-malware apps help protect against malware. You need all three applications in order t be fully protected. You only need one firewall app on your PC. Both Windows OS and MAC OS X come with firewall software.

Hacker

A hacker is a person who gains unauthorized access to networks in order to steal and corrupt information and data. •The term hacker and cracker are synonymous

Script Kiddie

Amateur computer hackers with little programming expertise. •Illegally gain access to computer systems using programs (scripts) that others have written •Do not have the skill or experience to write their own programs

DDoS

Computers that have been infected by a virus act as "zombies" and work together to send out illegitimate messages creating a huge volumes of network traffic. The high volumes of network traffic often result in a network crash.

Firewall

Hardware or software used to keep a computer secure from outside threats such as hackers and viruses. •Allow or block Internet traffic in and out of a network or computer •The most ideal firewall configuration consists of both hardware and software •Personal software firewalls are typically include with the operating system. Hardware based firewalls can be purchased as a stand-alone product

Session Cookie

Stored in temporary memory and is lost when the browser is closed. •Determine the start and end of a session •Analyze and measure traffic on a web page •Determine the web browser being used

Persistent Cookie

Stored on a user's hard drive and collects information about: •User preferences •Password and username information •IP address •Data on web surfing behavior

Adjusting cookie settings in Microsoft Edge

1. Open Microsoft Edge. 2. Press the three-dot More Actions button on the top right. 3. Select Settings from the menu then tap or click View Advanced Settings. 4. Press the drop down arrow then select Block All Cookies of Block Only Third Party Cookies.

Zombie

A computer controlled by a hacker. •Groups of compromised computers that are controlled by a hacker are called botnets Hackers use zombies to: •Send spam to zombie contacts •Launch a DDOS attack

Cybercrime

A crime in which a computer is the object of the crime or is used to commit a criminal offense. •Single event - Victims endure a single event cybercrime such as unknowingly downloading a Trojan horse virus or installing a keystroke logger •On-going series of events. More serious than a single event cybercrimes

Deleting cookies in Mozilla Firefox

Click the menu button, choose History, and the Clear Recent History... 1. Set Time range to clear to Everything. 2. Click on the arrow next to Details to expand the list of history items. 3. Select Cookies and make sure that other items you want to keep are not selected. 4. Click Clear Now to clear the cookies and close the Clear Recent History window.

Virus symptoms

Computers infected with a virus exhibit many symptoms including: •OS doesn't launch properly •Files get deleted or encrypted •Strange error messages or pop-up ads •Documents won't save •Computer runs notably slower •Programs launch on their own

How firewalls work

Filter all information coming through the Internet to your network or computer system. There are a variety of techniques that are used to minimize the risk of harmful intrusions into a comp0ter or network including: •Packet filters - A packet filter inspects each packet leaving or entering network •Proxy Server - intercept all messages between client and server

Internet Filter

Firewall software used to block a user's access to specific Internet content.

Hacktivism

Hacktivism is the act of hacking, or breaking into a computer system for a politically or socially motivated purposes. •Uses same techniques as a hacker, but does so in order to disrupt service and bring attention to a political or social cause

How antivirus programs work

One popular techniques that many antivirus programs use is to look for a virus signature. •A virus signature is the software code of a particular computervirus •The antivirus program compares its database of known virus signatures with the files on a digital device and on removeable media •Once the virus is identified the antivirus software attempts to remove the virus from the file

Online Nuisances

Online nuisances are annoying software programs that can slow down the operations a computer, clog email inboxes, and lead to the theft of information and money. Online nuisances include: •Spam •Spyware •Phishing and Pharming •Trolling and Spoofing

Password Management

Password security is one of the most important issues for today's computer users. •The best way to keep your Internet information safe is to use a strong password and to never use the same password twice •Managing passwords can be very difficult to do on your own, so experts suggest using password management software to keep your passwords safe

Pharming

Pharming is a type of phishing that seeks to obtain personal information through malicious software that is inserted on a victim's computer. •Redirects the user to a phony web page •When the user has reached the fake web page they are encouraged to enter sensitive personal information

Cookies in Safari

Safari accepts cookies and website data only from websites you visit. This helps prevent certain advertiser from storing data on your device. •You can change option in safari preferences so that Safari always accepts or blocks cookies and other website data •Important: Changing your coolies preferences or removing cookies and other website data in Safari may change or remove them in other app, including Dashboard

Cookie

Small text file of information created by websites you visit that your web browser stores on you hard disk. •First-Party Cookie •Third-Party Cookie

Adware

Software that collects the user's web browsing history. This data is collected then used to create unsolicited targeted pop-up advertisements. •Adware often accompanies downloaded programs

Virus

Software that infects computers. •Created using computer code •Typically must be "run" to attack and do damage •Can destroy programs or alter the operations of a computer or network

Spam

Spam is an unsolicited email message. •Spam messages are sometimes called UBE (unsolicited bulk email) and are used for a variety of marketing purposes including selling products and services •Messages may contain a variety of malicious programs

Packet Sniffer

Specialized hardware or software that captures packets transmitted over a network. •Legitimate sniffers are used for routine examination and problem detection •Unauthorized sniffers are used to steal information •Packet sniffers can be very difficult to detect

Spyware

Spyware is software that collects information about your Internet surfing habits and behaviors. •Includes the collection of keystrokes, passwords, and confidential information •Often installed via free downloads or by visiting certain illegitimate websites

Password tips and techniques

•Change your passwords frequently •Use generic passwords • keep your password private •Use a combination of letters, symbols, and numbers •Check your accounts

Trojan

A program that appears legitimate, but executes an unwanted activity when activated. •Often used to find passwords, destroy data, or to bypass firewalls •Similar to viruses, do not replicate themselves •Often found attached to free downloads and apps

Deleting cookies in Google Chrome

1. Click the Chrome menu on the browser toolbar (right upper corner of the screen). 2. Select Settings. 3. Click Show advance settings. 4. In the "Privacy" section, click the Content settings button. 5. In the "Cookies" section, change the following cookies settings: 6. Click All cookies and site data to open the Cookies and site data dialog. 7. To delete all cookies, click Remove all at the bottom of the dialog. To delete a specific cookie, hover over the site that issued the cookie with your mouse, then click the X.

Blocking cookies in Mozilla Firefox

1. Go to the website you wish to block from setting cookies in Firefox. 2. Right-click within the page and select View Page info. In the Page Info window, select the Permissions panel. 3. Underneath Set Cookies, remove the check mark from Use Default. 4. Change the setting to block and close the Page Info window and remove any cookies that the website has already set in Firefox.

Explain how to setup an Internet filter in Microsoft Windows

1. Open Parental Controls by clicking the Start button, clicking Control Panel, then under User Accounts and Family Safety, click Set up Parental Controls for any user 2. Click the standard user account that you want to set Parental Controls for IF the standard user account isn't set up yet, click Create a new user account to set up a new account. 3. Under parental Controls, click ON enforce current settings 4. Once you've turned on Parental Controls for your standard user account, you can adjust time limits

How do computer viruses work

1. Virus arrives via email attachment, file download, or by "clicking" in an infected website 2. An action triggers the virus 3. The virus spreads to other computer/devices or network 4. The activated virus starts its destructive actions

Antivirus Software

Antivirus software is a computer program that is used to scan files to identify and remove computer viruses and other malicious programs. •Antivirus programs use a variety of techniques to identify and remove viruses and malware •Tow of the most common techniques are using signature-based detection and heuristic-based detection

Network Address Translation (NAT)

Developed by Cisco, is used by firewalls, routers, and computers that are part of a network and are connected to the Internet. •Used in firewalls to provide protection from outside network intrusions by hiding internal IP addresses •Can be used to prevent many types of network attacks, but in order to maximize security it must be used in conjunction with the firewall built into the router or the firewall provided by the OS

International Privacy Laws

Vary greatly - Nations don't agree on standardized Internet privacy laws. Some protections exist: European Union (EU) - Data Protection Directive - Under EU law, personal data can only be gathered legally under strict conditions.

Fee based vs. free antivirus software

There are many choices of free vs. fee based antivirus software programs. Which one is the best choice? This depends on a number offactors. •One of the main differences between free and fee antivirus software is the number of features •Many free antivirus programs come with advertising •Most of the free antivirus programs performed almost as effectively as their fee-based counterparts

Customizing Cookies in Internet Explorer

1. Open the desktop, and then tap or click the Internet Explorer icon on the taskbar. 2. Tap or click the Tools button, and then tap or click the Internet options. 3. On the Privacy tab, do one or more of the following: To set what types of cookies are blocked or allowed. To block or allow specific websites, tap or click Sites. To import a privacy preferences file, tap or click Import. To override your privacy settings for certain types of cookies, tap or click Advanced. To reset privacy settings to their original level, tap or click Default. 4. When you're done making changes, tap or click OK.

Allowing Cookies in Internet Explorer

1. Open the desktop, and then tap or click the Internet Explorer options. 2. Tap or click the Tools button, and then tap or click Internet options. 3. Tap or click the Privacy tab, and under Settings, move the slider Blocking cookies might prevent some pages from displaying correctly, or you might get a message from a site letting you know that you need to allow cookies to view that site.


संबंधित स्टडी सेट्स

Section 9-1, 9-2 Chemical Pathways

View Set

Ch. - 16 The Reproductive System

View Set

Chapter 12: Oncologic Management

View Set

There There - Jacquie Red Feather

View Set

Ch. 3: Fieldwork and ethnography

View Set

Marketing Research: CH 4- "Using Secondary Data & Online Information"

View Set