CH. 11 Computer Security

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Rootkits are typically used to allow hackers to do which of the following?

- install rogue files - encrypt files - create backdoors

what type of server intercepts all messages between client and server to help avert a hacker or other intruder from attacking a network?

proxy

Amateur computer hackers with little programming expertise that illegally gain access to computer systems using programs (scripts) that others have written are called _________ kiddies.

scripts

Computer viruses can be disguised as attachments of funny images, greeting cards, or audio and video files.

true

What are symptoms that your system has been hacked?

- fake emails or social messages from your account - redirected internet searches - unwanted browser toolbars

A category of cyberterrorism that focus on hacking computer system for political or socially motivated purposes is_______.

hacktivism

Steps of a virus infection:

1. the virus via email attachment, file download, or by visiting an infected site. 2. an action such as running or opening the file triggers the virus 3. the payload is activated and the virus starts its destructive actions

Developed by Cisco and used by firewalls, routers and computers that are part of a network and are connected to the Internet, Network ___________, Translation provides a type of firewall protection by hiding internal IP addresses.

Address

third-party cookies

small text file of information created by a website other than the one your currently visiting and are used to track your surfing habits and are considered an invasion of privacy.

Web cookie

small text file of information created by websites you visit that your web browser stores on your hard disk.

Safety-shield employs computer experts who test the security measures of an orginazation's information systems to ensure they are protected against intrusions. These Safety-shield employees are called ____.

white hat hackers

how to adjust cookie and data permission settings in Google:

1. click the chrome menu on the browser toolbar then select settings 2. click show advanced settings. in the "privacy" section, click content settings button 3. in the cookies section change the desired cookies settings

Typical firewall programs or hardware devices filter all information coming through the internet to your network or computer system. there are a variety of techniques that are used to minimize the risk of harmful intrusions into a computer or network including:

- proxy servers - packet filters

Ways to catch a computer virus:

- Downloading files from the internet - visiting questionable sites - opening suspicious or infected email messages.

Antivirus programs use a variety of techniques to identify and remove viruses and malware. Two of the most common techniques are:

- heruistic-based detection - signature- based detection

Spyware is software that collects information about your internet surfing habits and behaviors. Spyware includes the collection of:

- keystrokes - account numbers - passwords

software that collects a user's web browsing history software that collects a user's web browser web browsing history to create unsolicited targeted pop-up advertisements is called ___________.

adware

A deliberate misuse of computers and networks via the internet that uses malicious code to modify the normal operations of a computer or network is called a _________.

cyberattack

overheating, humidity, and magnetic fields can cause damage to the ___ of a digital device

hardware

experts suggest using password ___ software to keep your passwords safe

managment

This is the options tab in mozilla firefox. where would you click to adjust cookie settings?

privacy

On a Mac home screen, where do you click to access to adjust parental control settings?

- Apple - Settings

Symptoms of an online nuisance attack:

- pop-up start appearing after you visit unfamiliar websites - recieving a lot of spam messages or bounced back email messages - frequent pop-ups while searching the web or working in programs

One version of malware encrypts the victim's data until a payment is made. Another version threatens to make public the victim's personal data unless a payment is made. This is called ________.

ransonware

The illegitimate use of an email message that is sent to collect personal information and appears to be from an established organization such as a bank, financial institution, or insurance company is called.

phishing

What type of cookie is stored in temporary memory and is lost when the web browser is closed?

session

Persistent cookies store information about

- user preferences - password and username information

Stored on a user's hard drive, cookies that collect information about user preferences, password and username information, IP address, and data on web-surfing behavior are referred to as _______ cookies.

persistent

Specialized hardware or software that capture packets transmitted over a network are called packet _____.

sniffers

You can change your Firefox settings to allow you to:

- delete stored cookies automatically when you start FireFox - Deny cookie storage request - approve cookies storage requests.

In the settings area of each browser you should consider:

- deleting cookies - decide from which sites you want to allow cookies - blocking or customizing you cookie settings

How to turn on parental controls:

1. Open parental controls 2. click the standard user account that you want to set Parental Controls for 3. Adjust time limits, access to specific programs, access to specific websites 4. Under Parental Controls click "on" then enforce current settings.

Setting restrictions in Mac OS X:

1. Select system prefrences then click parental control 2. Click the lock icon to unlock it then enter an admistrator name and password 3. select a user, the click on of the tabs along the top

How to adjust cookies on Safari:

1. choose safari 2. click prefrences 3. click privacy 4. change cookie settings

a group of compromised computers controlled by a hacker is called a ________.

Botnet

A hacker launches an attack on a network that is designed to interupt or stop network traffic by flooding it with too many requests. This would be considered a ___________ attack.

DDoS or DoS

A DDoS attack is when computers that have been infected by a virus act as "zombies" and work together to send out illegitimate messages creating huge volumes of network traffice. The acronym DDoS stands for _________.

Distributed Denial of Service

Juan attempts to gain unauthorized access to networks. Juan would be considered a:

Hacker

The organization you should contact if you receive a phishing message:

US-CERT

A person who harms or harasses via information technology and networks in a repeated and deliberated manner is called a _______.

cyberbullying

A crime in which a computer is the object of the crime or is used to commit a criminal or offense is called _______.

cybercrime

Firewall software used to block a user's access to specific Internet content is called a(n) _____ filter.

internet

A virus written in a specific language and placed within a document or spreadsheet is called a ________ virus.

macro

Once the virus is identified the antivirus software attempts to remove the virus from the file. If the software cannot remove the infected file it will send the file to an isolated area on the hard disk called _____.

quaratine

the software code of a particular computer virus is called the virus ________.

signature

Signs your system might have been hacked including fake antivirus messages and unwanted browser toolbars.

true

a type of malware that replicates itself throughout a single computer or across a network is called a _______.

worm

Initally, the US Computer Emergency Readiness Team (US-CERT) determined that these 2 vulerabilities would necessitate replacing a significant number of Intel and AMD computer processors.

- Spectre - Meltdown

Ways to avoid computer viruses

- adjust your web browsers's security settings to allow browsing only on trusted sites - surf the web and download content safely - purchase a new router every other year to ensure you have the latest firewall protections

What's true about script kiddies:

- amateur computer hackers with little programming expertise - illegally gain access to computer systems using programs (scripts) that other have written.

How to get into various firewall settings:

- clicking the start button - click the control panel - click system and security - click windows firewall

What settings can you restrict in Mac OS X?

- limit access to specific websites - Restrict user's access to other people through game center, mail, and messages - which apps the user can access

there are a variety off cookie settings that can be adjusted in google chrome including:

- making exceptions for cookies from specific websites or domains - deleting cookies - blocking/allowing cookies by default

Safari accepts cookies and website data from which of the following?

- only from websites you visit

What's true about keystroke loggers:

- software's based keystroke loggers are often a Trojan that is installed without the user's knowledge - Can be hardware devices and software applications - keystroke loggers can record passwords and confidential information

Which of the following are online nuisances?

- spoofing - spam

Malware is designed to do which of the following?

- steal information - incapacitate a computer or network - destroy data

One of the risks with cookies is:

- websites using cookies can collect your information and sell it to third parties.

first-party cookie

A small text file of information created by a website you visit that keep tracking of your personal preferences and the current web browsing session.

A program that appears legitimate, but executes an unwanted activity when activated is called a ________ horse virus.

Trojan

Spam messages are sometimes called ______ and are used for a variety of marketing purposes including selling products and services.

UBE

Rachel notices that her Facebook account displays advertisements based on her personal profile and browsing history. This type of online nuisance is called ____________.

adware

A computer program that scans files to identify and remove computer viruses and other malicious programs is called ________.

antivirus software

A _____ hat hacker breaks into computer systems with the intent of causing damage or stealing data.

black

After you have clicked on the Privacy tab in Safari, which of the following are ways to efficiently remove cookies and stored data?

click- remove all website data, or click details then select one or more websites, the click remove.

A person who uses computers and the internet to launch attacks against computer systems for political or ideological reasons is called a __________.

cyberterrorists

it is important to think before you click when __________ downloading software from the web.

downloading

a virus that is attached in a file in and sent via email message is called a ________virus.

email

anti-malware apps

help protect against malware

anti-virus programs

help protect against viruses

Firewalls

help protect against worms and hackers

Typically computer viruses must be _______________ to attack and do damage to a digital device.

opened and runned

creating a fake webpage to trick victims into divulging personal information is a type of phishing known as ______.

pharming

omputer software that is designed to prevent spam messages from entering into a user's email inbox is called ________.

spam filter


Set pelajaran terkait

waves, sound, light, color review

View Set

IHI PS 104 Teamwork and Communication

View Set

Personally Identifiable Information (PII) v4.0

View Set

UCONEXAM22 - Uconnect Customer FAQs

View Set

Chapter 2 HW: Samples, Good and Bad

View Set

Missouri life insurance exam practice

View Set