Itec
you can change your Firefox settings to allow you to
- delete stored cookies automatically when you start Firefox -Approve cookies storage requests -Deny cookie storage requests
other computer term
-Software Theft -First Party Cookies -Hardware Theft
singler event
-keystorke logger -trojan horse -phishing
true about packet sniffers
-legitimate sniffers are used for routine examination and problem detection -unauthorized sniffers are used to steal info.
Online Nuisance
-spoofing -Trolling -spyware -phishing
Malware is designed to do which of the following?
-steal info - incapacitate a computer/network -destroy data
parental control in microsoft
1) open 2) click 3)under 4) adjust
setting restriction in MAC OS
1. select system 2.click 3.select a user
A deliberate misuse of computers and networks via the uses malicious code to modify the normal operations of a computer/network
Cyberattack
DDos
Distriute Denial of service
an attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests called
DoS attack
web cookie
Small text file of info. created by website you visit that that your web browser stores on your hard disk
program that appears legitimate, but executes an unwanted activity when activated is called --horse virus
Trojan
spam messages are sometimes called ---- and are used for a variety of marketing purposes including selling products and services
UBE
program scan files to identify
antivirus software
what is true about worms
automatically reproduces itself
software that infects computers and is created using is
computer cirus
crime in which a computer is the object of the crime / used to commit a criminal offense
cybercrime
aperson who uses computers and the internet to launch attacks against computer systems for political/ ideoological reason
cyberterrorist
true about ergo
derived the study a very
fuction session cookie
determine determine analyze
signed by clinton 1988
digital
hardware or software to keep a computer secure
firewall
50dollar
for bank
overheating,humanity
hardware
international law
internet
form of spyware that records all actions typed on keyboard
keystroke logger
hiding ip
nat
Rachel notics that her Facebook account displyas advertisements based on her personal profile and browsing history
online nuisance: adware
Specialized hardware/ software that capture packets transmitted over a network are called
packet sniffers
expert suggest
password management
stored on a user's hard drive, a type of cookie that collects info. about user preferences, password and username info, ip address and data on web surfing
persistent cookie
creating a fake webpage to trick victims into divulging personal info. is a type of phishing
pharming
type phishing that seeks to obtain personal info through malicious software that
pharming
highlight(llegitmate use of an email message collect personal inforamation
phisihing
DMCA signed two
property organization
once the viruses identify
quarantine
one version of this malware encrypts the citims data until a payment is made.
ransomware
protected by intellectual
video games movies
software code of particular
viruses signature
Ransomware
when activated, encrypts files on user hard drive & then sets a decryption program
keystroke-logging trojan
when activated, saves all keystrokes for subsequent transmission to bvirus creator.
spam filters search for spam by watching for key words and by monitoring suspicious ----- patterns and frequencies
word
spam filters search for spam by watching for keywords and by monitoring suspicious --- patterns and frequencies.
word
a computer controlled by a hacker
zombie
online nulsances
-adware -spyware -spam
develop a cisco and used by firewall
address
transaction
business to consumer
passport issued
rfid chips
software that collects info about your internet surfing habits and behaviors
spyware
select what's true about macro viruses
-commands in the macro language set off the destructive events -when file is opened the macro virus executes -initiated by downloading and opening an infected attachment
step adjusting cookie settings
1. choose safari 2.click preference 3. click privacy 4) change cookie
There are a variety of cookie settings that can be adjusted in Google Chrome including
-Deleting cookies -blocking/allowing cookies by default -making exceptions for cookies from specific websites/domains
On-going series of events
-blackmail -cyberstalking
if you believe you have fallen victim to phising scam
-contact the instituition was message was allegedly sent from -contact US-CERT
hacker
-cyberterrorist -black hat -white hat -script kiddles
symptoms that your system has been hacked
-fake emails or social media messages from your account -redirected internet searches -unwanted browser toolbars
online nuisance
-frequent pop-ups while searching the web/working in programs -pop-ups start appearing after visiting unfamiliar sites -receiving a lot of spam emails and bounced back email.
Cyberattacks include:
-identity theft -pharming -DDOS attacks
computer software that is designed to prevent spam messages from entering into a user's email inbox
spam filter
DMCA digital
title2,1,3
main governmental
trade
connsidered intellectual
trademarks patents trade secret
Phishing
tricks users into reveling usernames and passwords by appearing legitimate.
click on the organization below that you should contact if you receive a phishing message
us-cert
virus symptoms
-if a system/network is infected severely, it may even black out/ not even launch the startup process - the operating system may not launch properly, and the computer user may need to reboot and restart the computer frequently to ensure all programs are starting and working fine. -critical files may get deletd automatically , and this can happen periodically or all at once
true about spyware
-includes the collection of keystorkes, passwords and confidential info -intstalled via free downloads or by visiting certain illegitimate websites -collects info about your internet surfing habits and behaviors.
true about passwords
-the term passcode and key are synonyms for pw -pws can be used to secure computers, networks,software,personal accounts and digital devices
ways to catch a computer virus
-visiting questionable internet sites -downloading files from the internet -borrowing a friends usb storage device to save a file.
virus
-you cannot boot your computer -your computer is running slower than usual.
this is window firewall area
1) clicking start button 2. control panel 3. system and security 4/ window firewall
steps to have firefox block cookies from one website
1) go to website 2) right click 3) in the page info 4)underneath set cookies
steps of a virus infection in correct order
1) the virus arrives via email attachment, file download, or by visiting an infected site. 2) action such as running/ opening the file triggers the virus. 3) the payload is activated & virus starts its destructive actions.
you need to adjust cookie and data permission settings in Google chrome
1)click the chrome menu on the browser toolbar then select settings 2) click show advanced settings. in the privacy section , click 3) in the Cookies section change the desired cookiest settings.
According to Mozilla, one of the most effiicient ways to clear cookies in Firefox
1)click the menu button, choose History and then Clear Recent History 2) once you have cleared recent history you should set the time range to clear Everything 3) Click on the arrow next to details to expand list of history items 4) select cookies and make sure that other items you want to keep are selected. close the clear recent history window. 5) click clear.
Software programs that hide in the operating system & allow for the installation of hidden files
rootkits
Computer viruses typically must be ---- to attack and do damage. viruses can destory programs/ alter the operations of a computer/ networks
run
typically computer viruses must be--- to attack and do damage to a digital device
run
internet filter installed
server router computer
stored in temporary memory, ----- cookies are used to analyze and measure
session
typed of cookie is stored in temporary
session
anitiviruses programs uses a variety
signature heuristic
First-party cookie
small text file of info. created by a website you visit that keep track of your personal preferences and the current web browsing session
Third-party cookie
small text file of information created by a website other than the one you are currently visiting and are used to track your surfing habits and are considered an invasion of privacy