Chapter 5 Security (ITEC)
Malware is designed to do?
-destroy data -steal information -Incapacitate a computer or network
Zombie
A computer that is controlled by a hacker who uses it to launch attacks on other computer systems.
worm
A destructive program that replicates itself throughout a single computer or across a network
Hacker
A person who secretly gains access to computers and files without permission.
virus signature
A software code of a particular computer virus.
rootkit(2)
A type of malware that is triggered each time you boot your computer.
Pharming
A type of phishing that seeks to obtain personal information through malicious software that is inserted on victims' computers and directs them to a fake webpage.
Script kiddies or script bunnies
Amateur computer hackers with little programming expertise that illegally gain access to computer systems using programs(scripts) that others have written.
spam
DeSean received an unsolicited email message from an unknown sender. This email was
Address
Developed by Cisco and used by firewalls, routers, and computers that are part of a network and are connected to the Internet, Network___Translation provides a type of firewall protection by hiding internal IP addresses
Are ways to prevent computer virus infections
Downloaded content from the web should only be from trusted sites. Install the latest antivirus software and update frequently. Web surfing should be limited to trusted sites.
Cyber-terrorist
Mary uses computers and internet to launch attacks against computer systems for political or ideological reasons. Mary is considered a
Which of the following are protected by intellectual property laws against unauthorized use or distribution?
Movies and Video games
Online nuisances
Spam Adware Spyware
Spyware
software that collects information about your Internet surfing habits and behaviors.
Sniffers
specialized hardware or software that capture packets transmitted over a network.
internet privacy
the right of personal privacy concerning the storing, distributing and displaying information concerning oneself via the internet
Phishing
tricks users into revealing usernames and passwords by appearing legitimate
Persistent cookies store information about
user preferences/password and username info
macro virus
A virus written in a macro language and usually embedded in document or spreadsheet files.
Hackers
Script Kiddle White Hat Black Hat Cyberterrorist
a few U.S. Internet privacy laws/rules of importance are:
-COPPA -the Red Flags Rule
What is true about keystroke loggers?
-Can be hardware devices and software applications -Software based keystroke loggers are often a Trojan that is installed without the user's knowledge -Keystroke loggers can record passwords and confidential information.
Cybercrimes
-Data Theft -Data corruption -Cyberbullying
Rootkits allow the remote users to:
-Delete files -Install rogue -Create backdoors
Functions of Session Cookies
-Determine the start and end of a session -Analyze and measure traffic on a web page -Determine the web browser being used
Cyberattack
-Packet Analyzer -DOS Attack -Rootkit
Are common email viruses
-Phishing -Ransomware -Keystroke logging Trojan
Digital Identity
-Social media postings -Purchasing behavior -Online Searches
internet privacy(2)
-Techniques and technologies used to protect sensitive data and information -How data and information is used -Who has access to data and information
Titles for DMCA for copyright issues
-Title 1 Online Copyright and Phonograms Treaties and Implementation Act -Title 2 Online Copyright Infringement Liability Limitation -Title 3 Computer Maintenance Competition Assurance
Virus
-Worm -Trojan Horse -Macro
Virus
-You cannot boot your computer -Your computer is running slower than usual
If you believe you have fallen victim to a phishing scam you should:
-contact US-CERT -contact the institution the message was allegedly sent from
symptoms that your system is hacked
-fake emails -Unwanted browser toolbars -Redirected Internet searches
packet sniffers
-legitimate sniffers are used for routine examination and problem detection.
Privacy risks associated with cookies
-websites using cookies can collect your information and sell it to third parties. -Websites can track your surfing behavior and create a profile. -Corporate and government entities can track your web behavior
Setting Parental Controls on Mac OS X
1. Select System Preferences, then click parental controls 2. Click the lock icon to unlock it, then enter an administrator name and password. 3.Select a user, then click Enable Parental Controls. 4. If the user is not in the list, click Add, then fill in the name, account, and password information to create a new user.
replicates
A worm is a type of malware that_itself throughout a single computer or across a network.
DoS attack
An attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests.
Run
Computer viruses typically must be able to__to attack and do damage. Viruses can destroy programs or alter the operations of a computer or network.
Management
Experts suggest using password___software to keep your passwords safe.
Online Nuisance(2)
Frequent pop-ups spam emails
Hacktivism
Hacking computer systems for a politically or socially motivated purposes
45
In an ergonomically correct workstation, your keyboard should be positioned to keep your wrists as possible. Arms should be positioned at a___-degree angle.
October 1, 2015
In the U.S the liability of paying for the fraud will fall on the party that is least chip-enabled.
Internet
International laws on___privacy vary greatly. It is very difficult to get nations across the globe to agree on standardized Internet privacy laws.
Downloading Software
It is important to think before you click when___software from the Web
quarantine
Once a virus is identified the antivirus software attempts to remove the virus from the file
RFID
Passports issued by the United States and many other counties include___chips
Rootkit
Software programs that hide in the operating system and allow for the installation of hidden files.
rootkit(3)
Software programs that hide in the operating system and allow for the installation of hidden files.
Word
Spam filters search for spam by watching for keywords and by monitoring suspicious__patterns and frequencies.
Session Cookies
Stored in temporary memory,___cookies are used to analyze and measure traffic on a web page.
persistent
Stored on a user's hard drive, a type of cookie that collects information about user preferences, password and username information, IP address, and data on web surfing behavior.
Distributed Denial of Service
The acronym DDoS stands for
Property
The digital Millennium Copyright Act implements two World Intellectual___Organization (WIPO) treaties.
Trade
The main governmental organization that oversees Internet privacy in the United States is the Federal Trade Commission.
US-CERT
The organization that you should contact if you receive a phishing message.
NAT
The technology that provides a type of firewall protection by hiding Internal IP addresses
State
These laws are created by both___and federal government. The main federal governmental organization that oversees Internet privacy is the FTC.
Phishing(2)
Tricks users into revealing usernames and passwords by appearing legitimate.
Copyright
a form of legal protection to prevent copying, for commercial purposes, original works of authorship, including books and music
Ransomware
a form of malicious software that infects your computer and asks for money
intellectual property
a human knowledge and ideas that the law protects against unauthorized use by others
Phishing
illegitimate email messages, sent to collect personal information, and that appear to be from an established organization such as a bank, or insurance company.
malicious software
malware is short for
Keystroke logging Trojan
when activated, saves all keystrokes for subsequent transmission to virus creator
Keystroke-logging Trojan
when activated, saves all keystrokes for subsequent transmission to virus creator