Security

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Password tips and techniques

Change passwords frequently Use generic passwords Keep passwords private Use combo of letters, symbols, and numbers Regularly check your accounts to ensure they have not been tampered with

Privacy concerns with cookies

Collect information about surfing habits and sell information to a variety of 3rd parties. Websites can use cookies to track your surfing behavior and use this information to create specific user profiles. Corporate and government entities can use cookies to monitor your surfing behavior.

Antivirus software

Computer program that is used to scan files to identify and remove computer viruses and other malicious programs. Use a variety of techniques to identify and remove viruses and malware Two of the most common techniques are signature based detection and heuristic based detection

Business to business B2B

Consists of transactions conducted between businesses. Restaurant placing online order for food from and established vendor is considered b2b transaction.

Consumer to Consumer C2C

Consists of transactions conducted between consumers. Purchasing an item from another consumer via eBay is an example.

Virtual private networks (VPNs)

Creates a secure connection between two computers Allow for encrypted communications using the internet as the pathway for data transmission and communication. They are used by organizations whose employees need to access hte company network remotely. VPNs allow users and establishes a secure connection

Social engineering

Deceptive means to gain access to confidential information, means phishing to trick authorized users into revealing usernames, passwords, or other personal information. Social engineering can also mean using personal relationships, influence, and trickery to get authorized users to divulge ways to access privileged information. Social engineering allows hackers an opportunity to get around firewalls without using sophisticated software

E-commerce

Electronic commerce, selling of products and services viz web. B2C, C2C, B2B

Service Set Identifier (SSID)

Every Wi-Fi signal is recognized according to its Service Set Identifier One router transmits this SSID every few seconds so that someone roaming near signal can find it Home networks: little need for roaming since all devices initially logged on to an SSID Should be able to disable router's SSID transmission os that outsiders can't use internet When someone outside your home uses the Internet from your network, this not only uses your bandwidth, byt you might be held responsible for any criminal activity committed through your Internet Protocol address

Session cookies

Files that are stored temporarily in memory. Session ends when web browser is closed Collect information about hte start and end of a browsing session. Analyze and measure web traffic on the web pages visited, and determine the web browser being used.

Firewalls

Hardware or software to keep a computer secure from outside threats such as hackers and viruses. Allow or block internet traffic in and out of a network or computer Most ideal firewall configuration consists of both hardware and software. Hardware based firewalls can be purchased as a stand alone product by are often also included in broadband routers. Personal software firewalls are typically included with the OS and can be configured based on user preference.

Debit card risks

If fraudulently used to make a purchase, there is no guarantee your money will ever be replaced. Especially true if your wait too long to report a fraud. Liable maximum $50 in fraudulent charges if you tell your bank within two business days of leaning about them.

Phishing

Illegittimate use of an email message that appears to be from an established organization such as a bank, financial institution, or insurance company. In order to appear legitimate, the message often contains the company's logo and identifying information. Phishing uses these legitimate looking email messages to con a user into giving up private information such as account numbers, SSN, and other personal information. Phishing scam will direct users to a fake website where they are asked to enter or update personal information.

Password

Secret code used to help prevent unauthorized access to data and user accounts. Passwords can be used to secure computers, networks, software, personal accounts, and digital devices. Only identify the verifications of the password, not the user. Biometrics are used to verify authenticity of the user. Terms passcode and keycode are synonymous for password Often generated by user. Produced by encryption software or by the vendor who produced the software.

Malware

Short for malicious software Designed to steal information, destroy data, impact the operations of a computer or network, or frustrate the user. Malware includes a variety of programs including viruses, worms, and Trojan horses.

Computer viruses

Software that infects computers. Created using computer code. Typically must run to attack and do damage by can destroy programs or alter the operations of a computer or network

Avoiding computer viruses

Some ways to avoid viruses include downloading and installing the latest antivirus software and installing and running a firewall Other ways to avoid viruses include only downloading software from trusted sites and only visiting trusted websites

Heuristic based detection

Technique to detect new malware by examining files for suspicious characteristics without and exact signature match Include behaviorial match detection and cloud based detection. Antivirus software is considered a necessity when surfing the web

Trojans

Trojan Horse software that appears to be legitimate but executes an unwanted activity when activated. Often used to find passwords, destroy data, or to bypass firewalls. Similar to worms but do not replicated themselves, they are attached to free downloads and apps

Pharming

Type of phishing that seeks to obtain personal information through malicious software that is inserted on a victim's computer. The malicious software redirects the user to a phony web page even when the correct web address is used. When the user has reached the fake web page they are encouraged to enter their usernames, passwords, and other sensitive personal information.

Hypertext Transfer Protocol Secure (HTTPS)

Used to make web transactions sager. Called Secure Socket Layer to ensure that the website a person is using is the one it is purported to be. Websites use the HTTPS protocol to encrypt data, such as credit card information being exchanged using the secure socket layer.

Signature based detection

Viruses are created with a specific set of data and instructions which constitute its signature Antivirus programs look for these signatures in order to find and remove the virus

Password managers

best way to keep logins sage is to use a strong password and to never use the same password twice. typical password manager installs as a plugin to handle password seizure and repeat. Log in to secure site, password management software offers to save your identification. When you return to that site, it automatically completes the login using your save information, but generates a new password for the next login TWO POPULAR PASSWORD MANAGEMENT SYSTEMS ARE DASHLANE 3 AND LASTPASS 3.0 PREMIUM

Business to Consumer B2C

consists of transactions conducted between established businesses and consumers, purchasing a book from Amazon.com is an example

Wi-Fi protected access version 2 (WPA2)

current wi-fi security encryption standard Setting up wpa2 with a new router is a simple process, although you may have to go to the router manufacturer's website

Worms

malware that replicates itself while looking to be an innocent form of executable file

Persistent cookies

stored on hard drive and are not lost when the web browser is closed. Persistent cookies are only lost if they are designed with an expiration date. Collect information about user preferences, username, and password information, IP address, and web surfing behavior. Can speed up your surfing


Set pelajaran terkait

Exam I, Modules1-2; GLY1102, Sum20

View Set

Digestion, Circulation, Respiratory, Excretory and Reproduction Schoolnet Practice

View Set

Women's Health Exam 2 [Monday 3/6/17]

View Set

Chapter 20 The Imperial republic

View Set

spanish test on future and future perfect

View Set

Chapter 8 Review: Statistics and Multiplication Equations

View Set