ITEC
Software that collects the user's web browsing history. This data collected then used to create unsolicited targeted pop up advertisements. Often accompanies downloaded programs
Adware
Computer program used to scan files to identify and remove computer viruses and other malicious programs
Antivirus software
Signature based detection Heuristic based detection Behavioral based detection Cloud based detection
Common antivirus software techniques
Small text file of information created by websites you visit that your web browser stores on your hard disk
Cookie
Websites can collect your info and sell to 3 party Can track surfing behavior and create user profile Monitor web behavior
Cookie privacy risks
A deliberate misuse of networks via the internet
Cyberattack
Pharming Phishing Spamming Spoofing
Cyberattack ex
Use of malicious code to modify the normal operations of a computer or network.
Cyberattacks
A crime in which the computer is the object of the crime or is used to commit a criminal offense
Cybercrime
Cyberespionage Internet scams Information theft Data manipulation
Cybercrimes ex
Uses computers and the internet to launch attacks against computer systems for political and ideological reasons
Cyberterrorist
Computers that have been infected by a virus act as "zombies" and work together to send out illegitimate messages creating huge volumes of network traffic. Can result in network crash
DDoS
Attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests
DoS attack
Phishing Ransomware Keystroke logging Trojan
Email virus ex
Hardware or software used to keep a computer secure from outside threats such as hackers and viruses Allows/Blocks internet traffic in and out of a network or computer Most ideal configuration consists of both hardware and software
Firewall
Protects against worms and hackers
Firewall
Filter all information coming through the internet to your network or computer system
Firewalls
Fake antivirus message Unwanted browser toolbar Frequent random pop ups Fake emails/social media messages
Hacked system
A person who gains unauthorized access to networks in order to steal and corrupt data and info
Hacker
The act of hacking, or breaking into a computer system, for politically or socially motivated purposes
Hacktivist
Firewall software used to block a user's access to specific internet content Can reside in user's computer or router Network Also can be called parental controls
Internet filter
The right of personal privacy concerning the storing, distributing and displaying information concerning oneself via the internet.
Internet privacy
A form of spyware that records all types of actions typed on a keyboard Can be hardware devices and software applications
Keystroke logger
Used for routine examination and problem detection
Legitimate sniffers
A virus written in macro language and placed within a document or spreadsheet Executes when file is opened
Macro virus
Viruses Worms Trojan Horses
Malware ex
Used in firewalls to protect from outside network intrusions by hiding internal IP addresses Must be used in conjunction with firewall provided by router or in the OS
NAT
Developed by Cisco Used by firewalls, routers, computers that are part of a network and are connected to the internet
Network Address Translation (NAT)
Spam Spyware Trolling Spoofing
Online nuisance ex
Annoying software programs that can slow down the operations, a computer, clog email inboxes and lead to the theft of information and money
Online nuisances
Specialized hardware or software that captures packets transmitted over a network
Packet Sniffer
Inspects each packet entering and leaving network
Packet filters
A secret code use to prevent unauthorized access to data and user accounts
Password
Stored on a user's hard drive and collects info about: User preferences Password and username info IP address Data on web surfing behavior
Persistent cookie
Type of phishing that seeks to obtain personal information through malicious software that is inserted on a victims computer Redirects the user to a phony web page
Pharming
The illegitimate use of an email message that appears to be from an established organization such as a financial institution or an insurance company
Phishing
Intercepts all messages between client and server
Proxy server
Steal information Destroy data Incapacitate a computer
Purpose of Malware
Type of malware that hides in the operating system and is triggered each time you boot your computer
Rootkit
Install rogue files Delete files Create "backdoor" to bypass security
Rootkit purposes
Amateur computer hackers with little programming expertise
Script kiddie
Stored in temporary memory and is lost when the browser is closed
Session cookie
Unsolicited email message Sometimes called UBE Messages may malicious programs
Spam
Computer software designed to prevent spam messages from entering into a users' email inbox. Also known as spam blockers Anti-spam utilities
Spam filter
Software that collects information about your internet surfing habits and behaviors. Includes the collection keystrokes, passwords, and confidential information
Spyware
A program that appears legitimate but executes unwanted activity when activated Do not replicate themselves Used to find passwords, destroy date, bypass firewalls
Trojan
Used to steal information
Unauthorized sniffers
Software that infects computer Created using computer code Can destroy or alter programs/ operations of a computer or network
Virus
OS doesn't launch properly Files get deleted or encrypted Strange error messages Documents won't save
Virus symptoms
Destructive program that replicates itself throughout a single computer or across a network Automatically reproduces itself Attacks wired and wireless networks
Worm
A computer controlled by a hacker
Zombie