CGS Exam 1

Ace your homework & exams now with Quizwiz!

Which of these would be considered a cybercrime?

- Internet scams - cyber espionage - information theft -Data manipulation, -data corruption, -cyberbullying

Protocol:

A protocol is a set of rules that govern communication between devices, specifying how data is transmitted and received. Protocols are crucial for efficient communication between digital devices.

Video Card (Graphics Card):

A video card, also known as a graphics card or graphics adapter, is responsible for graphics processing and generating video output. It allows users to view video content on a display device. High-end graphics cards are often used in gaming computers to achieve optimal graphics performance.

Cookies in Mozilla Firefox

Cookies can store various information, including personally identifiable data provided by the user. Users can change settings to approve or deny cookie storage requests and clear cookies automatically. Deleting Cookies in Mozilla Firefox: Access options, choose how much history to clear, and click "Clear Now."

IrDA (Infrared Data Association):

IrDA establishes protocols for infrared communication transfer. It uses infrared radio waves for data transmission, which are relatively long and require line-of-sight communication. Common applications of IrDA include wireless mice, keyboards, and remote controls.

Symptoms of Virus Infection:

Operating system issues, frequent reboots. Automatic deletion of critical files. Error messages, slow performance, or system crashes. Severe infections may lead to blackouts or startup failures.

Screensize:

Screensize is the actual viewable area of a display device, measured diagonally from one corner of the screen's viewable area to the other. Screensize can be a significant factor when choosing a digital device, as it affects the user's viewing experience.

Choose what is true about cookie privacy risks.

Website cookies can sell your information to third parties. Website cookies can track your surfing behavior and create a profile and corporate and government entities can track your web behavior.

Privacy Risks Associated with Cookies:

Websites using cookies can collect information about surfing habits and may sell it to third parties. Cookies can be used to track user behavior and create specific user profiles, potentially by corporate and government entities.

Windows Firewall:

Windows includes a built-in firewall known as Windows Firewall. Users can customize settings for different network locations. To turn on Windows Defender Firewall, navigate to Start > Settings > Update & Security > Windows Security > Firewall & network protection, and then select the appropriate network profile.

Cybersecurity Breaches

occurs when a hacker gains unauthorized access to an organization's systems, data, and information. Hackers use malicious applications and other techniques to reach restricted areas of a system or network. In simplified terms, a security breach is similar to a break-in at your home. If someone breaks into your home in an unauthorized way, it is considered a security breach. Security breaches are early-stage intrusions that can lead to system damage, data loss, and network downtime. -can occur in a variety of ways, including viruses, spyware, impersonation, and distributed denial of service (DDoS) attacks.

If antivirus software can not delete an infected file, it sends the file to a hard disk area called

quarantine

Hacktivism

the act of hacking or breaking into a computer system for a politically or socially motivated purpose. Individuals who take part in hacktivism are called hacktivists -use the same techniques as hackers, but do so in order to disrupt services and to bring attention to a political or social caus

Cybersecurity Vulnerabilities

weaknesses or flaws in system security procedures, design, implementation, and control that could be compromised accidentally or intentionally.

Safe Browsing

-go incognito -be captious using social media -use VPN

Lightning Connectors (Apple)

Developed by Apple for iPods, iPads, iPhones, and Apple Watch docks. Features an 8-pin connector and can adapt to USB, HDMI, or VGA connectors. Insertable in either direction, unlike USB.

Differentiating Computers

Distinguishing between types of computers is becoming increasingly difficult due to the convergence of features. Tablets may have detachable keyboards, 2-in-1s function as laptops and tablets, and all-in-one computers combine power and aesthetics

Zombies

Infected computers secretly controlled by outsiders. Form botnets for spamming and other malicious activities.

Macro Viruses

These are viruses embedded in documents or spreadsheets. Activated when the infected file is opened. Detect and remove with antivirus software.

Ongoing series of events

This is more serious than the single event and includes cyberstalking, child predation, extortion, blackmail, and terrorist activities.

Threat cures

are the policies, tools, and strategies used to lessen the impact of active security threats.

Diagnosing a Computer Impacted by Online Nuisances

Signs include receiving spam emails, frequent pop-ups, and targeted ads. Pop-ups appearing after visiting unfamiliar sites may indicate adware. Consider clearing cookies and using antivirus software to address pop-up issues

Which of the following are online annoyances?

Spam, spyware, and spoofing

Types of Online Nuisances

Spam: (UBE) Unsolicited email messages often used for marketing purposes or containing malicious programs. Phishing: Deceptive emails that impersonate legitimate organizations to trick users into revealing sensitive information. Pharming: Redirects users to fake websites, even when using correct web addresses, to collect personal data. Trolling and Spoofing: Posting provocative content online to damage reputation or provoke reactions. Clickbait: Uses misleading or sensationalized information to attract clicks. Pop-Up Ads: Unwanted advertisements that randomly appear while browsing.

HDMI (High-Definition Multimedia Interface)

Standard for high-definition audio and video transmission. Used for connecting audio-video devices.

Malware Objectives

Stealing information: Malware can be designed to steal sensitive data like passwords, financial information, or personal records. Data destruction: Some malware is programmed to delete or corrupt files and data. Computer or network incapacitation: Malware can render computers or entire networks inoperable. User frustration: Malware may disrupt normal computer functions and frustrate users.

Computer Storage:

Storage devices store data for future use. Differentiate between internal storage (integral to the device) and external storage (outside the device). Examples of external storage devices include external hard drives and USB drives. Storage capacity is typically measured in gigabytes (GB) and terabytes (TB).

Session Cookies:

Temporary text files stored in memory. They help with website navigation. Erased when the session or browser is closed.

Threat prevention

includes the policies and procedures an organization has designed and implemented to protect systems and data

Packet Sniffers

Capture network packets, used for analysis or unauthorized data theft. Can be difficult to detect. Differentiate between unfiltered and filtered sniffers

What order of steps should you take to always block cookies in Safari?

Choose Safari. Click Preferences. Click Privacy. Select Block all cookies.

Hard Drives vs. Solid-State Drives (SSDs):

Traditional hard drives use platters to store data, while SSDs are all-electronic with no moving parts. SSDs are faster, more durable, but often more expensive than hard drives. Hard drive capacity is measured in GB or TB. SSDs are used in smartphones, cameras, and tablets.

Common symptoms of a computer virus include?

having programs launch on their own, your computer runs very slowly, and your documents do not save.

Threat Mitigation

includes the policies and procedures that are put in place by an organization to help prevent against security incidents, data breaches, and unauthorized network access. Mitigation also includes policies and procedures to mitigate damage if and when a security attack occurs

How to Diagnose a Hacked System

-Fake antivirus messages—If you notice these messages, power down your computer and reboot it in safe mode. In safe mode, run your antivirus program. -Unwanted browser toolbars. -Frequent random pop-ups. -Fake e-mails or social media messages from your account. -Programs automatically connecting to the Internet. -Unusual activities such as passwords being reset. -A device starting or shutting down on its own.

Script Kiddies

-would-be hackers who attempt to gain unauthorized access to networks in order to steal and corrupt information and data. -use programs written by others and do not have the skill or experience to write their own hacking programs. They often use tricks found on YouTube to hack into networks or social media accounts.

Cache

Cache is high-speed storage located on the CPU for quick access to frequently used data or instructions. Memory cache (L1, L2, L3) is used by the CPU. Disk cache helps the hard drive store frequently accessed data.

Password tips and techniques:

Change your passwords frequently—The longer you use a password, the higher the risk. Use generic passwords—Do not use persons, places, or things that can be identified with you. Keep your password private—Do not share your passwords with others. Use a combination of letters, symbols, and numbers—The more characters you use, the more secure your password will be. Check your accounts—Regularly check your accounts to ensure they have not been tampered with

What Is Clock Speed?

Clock speed, or clock rate, is the speed at which the CPU performs operations and executes instructions. Measured in hertz (Hz), with modern processors operating at gigahertz (GHz), representing billions of cycles per second. Higher clock speeds often indicate faster performance.

Adware

Collects browsing history and displays targeted ads. May redirect searches to advertising sites. Often bundled with downloaded programs

Spyware

Collects user data, including keystrokes and confidential information. Installed through downloads or visiting illegitimate websites.

Starting a Windows Computer in Safe Mode

To start a device using the Windows operating system (OS) in safe mode: Click the Windows button. Click the Settings button. If necessary scroll down to view all options. Select Update & security. Select Recovery. Select Restart now. After rebooting the system, you will enter Windows RE (Recovery Environment). Select Troubleshoot. Select Advanced options. Select Startup Settings. Select Restart. Use number keys or function keys to Enable Safe Mode.

Spam

Unsolicited bulk email messages, sometimes containing malicious content. Around 50% of daily emails are considered spam. Reduce spam impact by using spam filters, not oversharing your email, and unsubscribing from email lists.

USB (Universal Serial Bus):

Used for data transfer between devices and charging. USB drives are also known as thumb drives, flash drives, or jump drives. Utilizes solid-state flash memory for storage. Offers fast data transfer and durability.

Ethernet

Used for local area networks and home network connections. Connects devices such as modems and routers. Ethernet cables come in various categories with different data transfer speeds (e.g., CAT5, CAT5e, CAT6, CAT8).

MIDI (Musical Instrument Digital Interface) Ports

Used to connect digital musical devices to computers. Facilitates the transfer of digital music signals. Common in music composition and production.

Single event

Victims endure a single-event cybercrime while unknowingly downloading a Trojan horse virus or installing a keystroke logger; or from phishing, theft or manipulation of data via hacking; or from viruses, identity theft, and e-commerce fraud.

How Viruses Work:

Viruses arrive via email attachments, downloads, or infected websites. Activation occurs when the user runs or opens an infected file. Viruses then replicate and spread to other devices or systems. The payload executes malicious actions on infected devices.

Wi-Fi (Wireless Fidelity)

Wi-Fi is a wireless local area network (LAN) technology. Wi-Fi-enabled devices can connect to Wi-Fi networks, providing wireless internet access. Wi-Fi operates using the 802.11 protocol and employs 2.4 GHz and 5.0 GHz radio waves. Hotspots are Wi-Fi transmission sites often found in public places, allowing users to access the internet.

Wireless Ports:

Wireless ports facilitate data transmission between fixed and mobile devices using short-range radio waves or light waves. Bluetooth transmissions generally remain strong within a range of about 35 feet, making it suitable for short-distance wireless communication. Infrared (IR) communication requires line-of-sight transmission and is commonly used for devices like TV controllers.

Black Hat Hackers

access computer systems with the intent of causing damage or stealing data. (hackers or crackers) main motivation is personal or financial gain. They can also be involved in cyber espionage, protest, or may simply be addicted to the thrill of hacking devices.

cybersecurity exploit

follows the identification of a system vulnerability. An exploit is the means through which a system vulnerability can be used by a hacker to execute a malicious activity on a system. Exploits include specific code, command sequences, and open-source exploit kits that are designed to take advantage of a software vulnerability or a flaw in system security. They allow for an intruder to remotely access a network to gain unwarranted privileges, which allows the intruder to move deeper into the organization's network

Threat identification

includes the security tools and oversight designed to identify specific and active security threats

Read-Only Memory (ROM):

is nonvolatile storage installed by the device manufacturer. It contains essential instructions, including boot instructions.

White Hat Hackers

nonmalicious computer security experts who choose to use their knowledge and skills for good rather than evil endeavors. They are also known as ethical hackers. Sometimes they are paid employees or contractors working for companies as security specialists who attempt to find issues or security breaches via hacking. - test the security measures of an organization's information systems to ensure that the organization is protected against malicious intrusions.

Define the Term Computer

Computers are digital devices that accept input, process and store the input, and provide output. They consist of hardware (physical components) and software (virtual elements like the operating system and applications). Computers complete four basic functions: input, processing, output, and storage. Various types of computers include laptops, desktops, tablets, smartphones, mainframes, servers, embedded devices, and more.

The CIA Triad

Confidentiality: Ensures data is not disclosed to unauthorized users. Integrity: Ensures data is accurate and protected from unauthorized changes. Availability: Ensures data and systems are accessible when needed.

Phishing

Deceptive emails impersonating legitimate organizations. Users are directed to fake websites to divulge sensitive information. Never provide personal information through email; contact the institution directly.

DoS and DDoS Attacks:

Denial of Service (DoS) interrupts network traffic. Distributed Denial of Service (DDoS) involves multiple infected devices. Attackers flood the network with requests, leading to crashes.

Ransomware:

Encrypts data, demands a ransom for decryption. Often delivered via Trojans or worms. Payment is made through difficult-to-trace methods.

VGA (Video Graphic Array) Connectors

Analog connectors for monitors and TVs. Commonly used in the past but largely replaced by DVI and HDMI. Capable of high resolution and frame rates.

Keystroke Loggers

Record all keyboard actions. Can be software or hardware-based. May be used for legitimate monitoring or malicious purposes

Pixel (Picture Element):

A pixel is the smallest unit in an electronic image, representing a single dot on the screen of a display device. Image quality improves with a higher number of pixels in an image

Rootkits

Malware hiding in the OS, granting remote control to the attacker. Types include firmware, bootloader, memory, and virtual rootkits.

Adjusting Cookie Settings in Microsoft Edge

Open Edge, go to settings, and manage cookies under "Cookies and site Permissions."

What Is a Cookie?

A cookie is a small text file created by a website and stored by the web browser on the computer's hard disk. When you revisit a website that uses cookies, your browser sends the cookie to the web server for customizing and optimizing your experience. First-party cookies are created by the website you visit, tracking preferences and the current session. Third-party cookies are created by other websites and track your browsing habits, often considered a privacy invasion.

Cyberattacks

A cyberattack is a deliberate misuse of computers and networks via the Internet. Cyberattacks are launched from one or multiple computers against a single computer, multiple computers, or computer networks. Cyberattacks are of the two following types: Attacks where the goal is to disable the target computer or disrupt network activity. Attacks where the goal is to get unauthorized access to the target computer's data.

Cyberterrorists

A cyberterrorist uses computers and the Internet to launch attacks against computer systems for political or ideological reasons. According to the U.S. Federal Bureau of Investigation, cyberterrorism is any premeditated, politically motivated attack against information, computer systems, computer programs, and data that results in violence against noncombatant targets by subnational groups or clandestine agents. Attacks include the disruption of e-commerce and government sites. The power grid and public utilities have also been targeted. According to a recent poll conducted by Gallop Inc., 84% of Americans believe cyberterrorism now ranks as the top critical threat to U.S. vital interests. This is the first time cyberterrorism has surpassed nuclear weapons and foreign terrorism as the most critical threat.

What Is a Firewall?

A firewall is a protective measure, either hardware or software, used to safeguard a computer from external threats like hackers and viruses. Firewalls control and regulate the flow of internet traffic into and out of a network or computer.

What Is a Digital Device Processor?

A processor or central processing unit (CPU) is the computer's "brain" where most calculations occur. It's integrated into a chip called a microprocessor and is essential for a digital device's functioning. The CPU consists of the ALU (arithmetic logic unit) and the control unit. The ALU handles arithmetic, comparison, and logic tasks. The control unit locates, analyzes, and executes program instructions in memory, coordinating the device's functions.

Single-Core vs. Multicore Processors:

A single-core processor has one core for processing tasks. A multicore processor has multiple cores (e.g., dual-core, quad-core) that can execute tasks simultaneously. Multicore processors enhance multitasking and overall performance.

According to US-CERT, you should contact them using one of the following methods when you receive a phishing message.

According to US-CERT, any time you receive a phishing e-mail you should contact them by sending the URL of the phishing website or in Outlook Express you can also open the e-mail message* and select File > Properties > Details. The e-mail headers will appear. You can copy these as you normally copy text and include it in a new message to [email protected].

Cybersecurity Threats

According to the National Institute of Standards and Technology (NIST), a cybersecurity threat is an event or condition that has the potential for causing asset loss and the undesirable consequences or impact from such loss. Assets include information, software, and hardware. The specific causes of asset loss arise from a variety of situations and events related to adversity, which are typically referred to as disruptions, hazards, or threats. Asset loss constitutes all forms of intentional, unintentional, accidental, incidental, misuse, abuse, error, weakness, defect, fault, and/or failure events and associated conditions. Cybersecurity threats should be assessed and remediated to prevent ongoing or future impacts.

Common Types of Malware

Viruses: These infect computers and replicate themselves, often requiring user interaction to activate. Worms: Self-replicating malware that can spread across networks without user intervention. Trojan Horses: Programs that appear legitimate but carry out malicious activities when executed.

Cyberbullying

According to the PEW Research Center, nearly half of U.S. teens reported being bullied or harassed online. Older teen girls are more likely to report being targeted by online abuse due to their appearance. Cyberbullying is harming or harassing a person or group of people via information technology and networks in a repeated and deliberate manner. Cyberbullies use Internet service and mobile technologies such as web pages and discussion groups as well as instant messaging and text messaging, with the intention of harming another person. Cyberstalking is a form of cyberbullying and often involves disturbed obsessions. Nearly all states have bullying laws in place, many with cyberbullying or electronic harassment provisions. What to do if you experience cyberbullying? Do not respond or reply—It is important not to engage with a cyberbully. Take screenshots—Screenshots allow you document the occurrences and serve as proof. Report the abuse—It is important to report the abuse to social media sites. Additionally, it may be appropriate to contact your local authorities. Block the bully—Make sure to block the bully from all of the social media sites you frequently use.

Bluetooth:

Bluetooth is a short-distance wireless communication technology that uses short-wavelength radio waves. It is capable of transferring data between devices, and its signals can pass through obstacles like walls and furniture. Bluetooth signals typically remain strong within a range of about 35 feet. Bluetooth is used in various devices, including headphones, keyboards, and smartphones.

Different Types of Computers:

Laptops: Mobile computers with integrated keyboards, suitable for portability and computing power. Popular among students and professionals. Tablets: Highly mobile touchscreen devices, often used for travel, reading emails, gaming, and more. Desktops: Stationary computers with separate system units and peripherals, allowing easy hardware upgrades. Suitable for families and businesses. All-in-One Computers: Combine the power of desktops with an elegant design by housing the motherboard within the monitor. Less bulky but not as easily upgradable. Embedded Computers: Part of a larger device or system, found in devices like digital watches, thermostats, and cars, often using real-time operating systems (RTOS). 2-in-1 Computers: Touchscreen laptops with detachable keyboards or flip-out screens, offering mobility and full operating systems. Smartphones: Handheld computers with cellular capabilities, featuring internet access, touchscreen interfaces, and cameras. Servers: Computers in a network shared by multiple users, including network, web, and file servers. Mainframes: Powerful computers used by organizations for large data processing, expensive but efficient. Supercomputers: The most powerful computers used for complex data processing, often owned by governments and research institutions.

Malware Origins and Intentions

Malware is a combination of "malicious" and "software." It is often created by hackers seeking financial gain, either by spreading it themselves or selling it on the Dark Web.

Managing Cookies

Managing cookies is crucial for safe and efficient web browsing. Cookie settings can be adjusted in each browser used. Settings include deleting cookies, blocking or customizing them, and allowing cookies.

Network Address Translation (NAT):

NAT is used in firewalls, routers, and internet-connected computers. It hides internal IP addresses from external networks, enhancing security. NAT is employed to prevent various network attacks and is often used in conjunction with the router's or the operating system's built-in firewall.

3.5-mm Audio Connectors

Popular for audio devices like headphones and earbuds. Standardized in the 1950s with the rise of transistor radios. Evolved to support both headphones and microphones in the 1980s.

Factors That Damage Computer Hardware

Protecting digital device hardware is essential to ensure its longevity. Factors that can damage hardware include power surges, overheating, humidity, and magnetic fields. Protection measures include using surge protectors, uninterruptible power supplies (UPS), and voltage converters when traveling abroad.

Memory (RAM):

RAM stands for random access memory and is electronic, volatile memory. RAM is used for program execution and is cleared when the device powers off. Comes in different capacities, impacting processing speed. RAM allows computers to multitask effectively.

Pharming

Redirects users to fake websites through malicious software or DNS poisoning. Users may enter personal information on these fake sites. Be cautious and verify website addresses.

Resolution

Resolution refers to the clarity and detail of an image displayed on a screen. It is measured in pixels, with higher resolution displays having more pixels. The more pixels a display device has, the higher its resolution, resulting in sharper and more detailed images

What Is the Machine Cycle?

The machine cycle is a series of steps a processor follows when executing an instruction. It includes Fetch (retrieve instruction/data from RAM), Decode (interpret the instruction), Execute (perform the instruction), and Store (save results in RAM).

Types of Firewalls

The most effective firewall configuration consists of both hardware and software components. Personal software firewalls are typically included with the operating system and can be configured according to user preferences. Hardware-based firewalls can be standalone products or integrated into broadband routers.

How Do Firewalls Work?

Firewalls filter all incoming and outgoing internet traffic to minimize the risk of harmful intrusions. Techniques employed by firewalls include packet filters, which inspect and accept or reject packets based on predefined rules, and proxy servers that intercept messages between clients and servers to thwart hackers.

Firewall Options:

Firewalls, antivirus, and anti-malware applications serve different security purposes. Firewalls protect against hackers and worms, antivirus software guards against viruses, and anti-malware software defends against various types of malware. It's recommended to have all three applications for comprehensive protection. Using multiple firewall applications on one computer can lead to conflicts and issues.

Graphics Output:

Graphics refer to the representation of image data on a display or output device. Graphics are typically generated by a dedicated processor called the graphics processing unit (GPU).

Hackers

Hacking refers to activities that seek to compromise the security of digital devices such as laptop computers, smartphones, tablets, and entire networks. -motivated by the financial gain, protest, information gathering (spying), or just for the challenge

Cybercrime

In cybercrime a computer is used to commit a criminal offense. Cyber criminals use computer technology to access personal information, discover trade secrets, or use the Internet for a variety of exploitative or malicious purposes.

Preventing Virus Infections:

Install and regularly update antivirus software. Use a firewall for network protection. Visit trusted websites and download safely. Avoid opening files or messages from unknown sources. Keep software and operating systems up-to-date. Be cautious with email attachments and links.

Different Processor Manufacturers:

Intel: Founded in 1968, the world's largest processor manufacturer. AMD: Founded in 1969, known for technology used in gaming consoles. NVIDIA: Founded in 1993, specializes in graphical processing units (GPUs).

What Are Internet Filters?

Internet filters are firewall software applications used to block a user's access to specific internet content. They are commonly used by organizations, parents, and businesses to restrict access to file transfers, websites, or internet downloads. Internet filter software can be installed on a router, a user's computer, or a network. These filters are often referred to as parental controls, as they are frequently used for monitoring and controlling internet access for children.

Native Resolution:

Native resolution is the maximum resolution supported by a display device. It is typically expressed in terms of horizontal and vertical pixels, such as 1920x1080 (1920 horizontal pixels by 1080 vertical pixels). A display is considered pixel-perfect when the incoming video signal matches its native resolution, ensuring the best image quality.

Managing Cookies in Google Chrome

Options to block/allow cookies, delete cookies, and make exceptions for specific websites. Deleting Cookies in Google Chrome: Access settings, select "History," and clear browsing data, including cookies

What Is Overclocking?

Overclocking involves running a processor faster than the manufacturer's recommended speed. Can boost performance but may void warranties and require additional cooling. Typically done by gamers and computer enthusiasts.

Managing Cookies in Safari

Safari accepts cookies and website data only from visited websites, but users can change preferences to always accept or block cookies. Removing Stored Data and Cookies in Safari: Access Safari preferences, click "Privacy," and choose options to prevent tracking, block all cookies, or remove stored cookies and data.

Persistent Cookies

Stored on the hard drive and persist even after the browser is closed unless designed with an expiration date. Collect user preferences, login information, IP address, and browsing behavior.


Related study sets

Enteral Nutrition Administration, Monitoring, and Clinical Issues

View Set

Chemistry - Acid-Base Metabolism

View Set

RHIT Practice Questions: Domain 3 (Data Analytics and Use)

View Set

Texas Health and Life Insurance ExamFX

View Set

LS1 Week 8 Chapter 52 Assessment and Management of Pt with Endocrine Disorders

View Set

Week 4 - Budget Constraints and Consumer Preferences

View Set

Chapter 3 quiz: Life policy provisions, riders and options

View Set