Chapter 5 Security (ITEC)

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Malware is designed to do?

-destroy data -steal information -Incapacitate a computer or network

Zombie

A computer that is controlled by a hacker who uses it to launch attacks on other computer systems.

worm

A destructive program that replicates itself throughout a single computer or across a network

Hacker

A person who secretly gains access to computers and files without permission.

virus signature

A software code of a particular computer virus.

rootkit(2)

A type of malware that is triggered each time you boot your computer.

Pharming

A type of phishing that seeks to obtain personal information through malicious software that is inserted on victims' computers and directs them to a fake webpage.

Script kiddies or script bunnies

Amateur computer hackers with little programming expertise that illegally gain access to computer systems using programs(scripts) that others have written.

spam

DeSean received an unsolicited email message from an unknown sender. This email was

Address

Developed by Cisco and used by firewalls, routers, and computers that are part of a network and are connected to the Internet, Network___Translation provides a type of firewall protection by hiding internal IP addresses

Are ways to prevent computer virus infections

Downloaded content from the web should only be from trusted sites. Install the latest antivirus software and update frequently. Web surfing should be limited to trusted sites.

Cyber-terrorist

Mary uses computers and internet to launch attacks against computer systems for political or ideological reasons. Mary is considered a

Which of the following are protected by intellectual property laws against unauthorized use or distribution?

Movies and Video games

Online nuisances

Spam Adware Spyware

Spyware

software that collects information about your Internet surfing habits and behaviors.

Sniffers

specialized hardware or software that capture packets transmitted over a network.

internet privacy

the right of personal privacy concerning the storing, distributing and displaying information concerning oneself via the internet

Phishing

tricks users into revealing usernames and passwords by appearing legitimate

Persistent cookies store information about

user preferences/password and username info

macro virus

A virus written in a macro language and usually embedded in document or spreadsheet files.

Hackers

Script Kiddle White Hat Black Hat Cyberterrorist

a few U.S. Internet privacy laws/rules of importance are:

-COPPA -the Red Flags Rule

What is true about keystroke loggers?

-Can be hardware devices and software applications -Software based keystroke loggers are often a Trojan that is installed without the user's knowledge -Keystroke loggers can record passwords and confidential information.

Cybercrimes

-Data Theft -Data corruption -Cyberbullying

Rootkits allow the remote users to:

-Delete files -Install rogue -Create backdoors

Functions of Session Cookies

-Determine the start and end of a session -Analyze and measure traffic on a web page -Determine the web browser being used

Cyberattack

-Packet Analyzer -DOS Attack -Rootkit

Are common email viruses

-Phishing -Ransomware -Keystroke logging Trojan

Digital Identity

-Social media postings -Purchasing behavior -Online Searches

internet privacy(2)

-Techniques and technologies used to protect sensitive data and information -How data and information is used -Who has access to data and information

Titles for DMCA for copyright issues

-Title 1 Online Copyright and Phonograms Treaties and Implementation Act -Title 2 Online Copyright Infringement Liability Limitation -Title 3 Computer Maintenance Competition Assurance

Virus

-Worm -Trojan Horse -Macro

Virus

-You cannot boot your computer -Your computer is running slower than usual

If you believe you have fallen victim to a phishing scam you should:

-contact US-CERT -contact the institution the message was allegedly sent from

symptoms that your system is hacked

-fake emails -Unwanted browser toolbars -Redirected Internet searches

packet sniffers

-legitimate sniffers are used for routine examination and problem detection.

Privacy risks associated with cookies

-websites using cookies can collect your information and sell it to third parties. -Websites can track your surfing behavior and create a profile. -Corporate and government entities can track your web behavior

Setting Parental Controls on Mac OS X

1. Select System Preferences, then click parental controls 2. Click the lock icon to unlock it, then enter an administrator name and password. 3.Select a user, then click Enable Parental Controls. 4. If the user is not in the list, click Add, then fill in the name, account, and password information to create a new user.

replicates

A worm is a type of malware that_itself throughout a single computer or across a network.

DoS attack

An attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests.

Run

Computer viruses typically must be able to__to attack and do damage. Viruses can destroy programs or alter the operations of a computer or network.

Management

Experts suggest using password___software to keep your passwords safe.

Online Nuisance(2)

Frequent pop-ups spam emails

Hacktivism

Hacking computer systems for a politically or socially motivated purposes

45

In an ergonomically correct workstation, your keyboard should be positioned to keep your wrists as possible. Arms should be positioned at a___-degree angle.

October 1, 2015

In the U.S the liability of paying for the fraud will fall on the party that is least chip-enabled.

Internet

International laws on___privacy vary greatly. It is very difficult to get nations across the globe to agree on standardized Internet privacy laws.

Downloading Software

It is important to think before you click when___software from the Web

quarantine

Once a virus is identified the antivirus software attempts to remove the virus from the file

RFID

Passports issued by the United States and many other counties include___chips

Rootkit

Software programs that hide in the operating system and allow for the installation of hidden files.

rootkit(3)

Software programs that hide in the operating system and allow for the installation of hidden files.

Word

Spam filters search for spam by watching for keywords and by monitoring suspicious__patterns and frequencies.

Session Cookies

Stored in temporary memory,___cookies are used to analyze and measure traffic on a web page.

persistent

Stored on a user's hard drive, a type of cookie that collects information about user preferences, password and username information, IP address, and data on web surfing behavior.

Distributed Denial of Service

The acronym DDoS stands for

Property

The digital Millennium Copyright Act implements two World Intellectual___Organization (WIPO) treaties.

Trade

The main governmental organization that oversees Internet privacy in the United States is the Federal Trade Commission.

US-CERT

The organization that you should contact if you receive a phishing message.

NAT

The technology that provides a type of firewall protection by hiding Internal IP addresses

State

These laws are created by both___and federal government. The main federal governmental organization that oversees Internet privacy is the FTC.

Phishing(2)

Tricks users into revealing usernames and passwords by appearing legitimate.

Copyright

a form of legal protection to prevent copying, for commercial purposes, original works of authorship, including books and music

Ransomware

a form of malicious software that infects your computer and asks for money

intellectual property

a human knowledge and ideas that the law protects against unauthorized use by others

Phishing

illegitimate email messages, sent to collect personal information, and that appear to be from an established organization such as a bank, or insurance company.

malicious software

malware is short for

Keystroke logging Trojan

when activated, saves all keystrokes for subsequent transmission to virus creator

Keystroke-logging Trojan

when activated, saves all keystrokes for subsequent transmission to virus creator


Set pelajaran terkait

(Your vs You're) & (Yours vs Your's)

View Set

Bus Strategy: MGMT 498 CH 12 Quiz

View Set

Final Exam All Material, Final Exam New Material, Exam 4 All Questions, NUR 112 Exam 3 ALL QUESTIONS

View Set

سؤال وجواب في التاريخ الاسلامي

View Set

Business Law Chapter 13 Smartbook

View Set