Chapter 9 - Study Guide

Ace your homework & exams now with Quizwiz!

Be familiar with security suggestions like: strong passwords, authentication, biometrics usage, VPNs, backups, and surge protectors

creating strong passwords—ones that are difficult for hackers to guess—is an essential piece of security that people sometimes overlook biometric authentication device: a device that reads a unique personal characteristic such as a fingerprint or the iris pattern in your eye and converts its pattern to a digital code backup: copies of files that you can use to replace the originals if they're lost or damaged surge protectors: a device that protects your computer against power surges

Differentiate between DOS and DDOS attacks. What are logical ports?

denial of service (DoS) attacks: hackers are repeatedly making requests of that computer system through a computer they have taken over as a zombie distributed denial of service (DDOS) attack: launches DoS attacks from more than one zombie at the same time logical ports: virtual communications paths

What are the types of firewalls discussed in class?

firewall: a software program or hardware device designed to protect computers from hackers software firewall hardware firewall personal firewall

Define identity theft and hacking

identity theft: when a thief steals personal information and poses as you in financial or legal transactions hacking: anyone who unlawfully breaks into a computer system

Define packet filtering, logical ports, virus signature, quarantining, and network address translation

packet filtering: filter out packets sent to specific logical ports logical ports blocking: completely refuse requests from the Internet asking for access to specific ports virus signature: quarantining: network address translation: assign internal IP addresses on a network

What are the different types of hackers discussed in class?

white-hat (ethical) hackers: break in to systems for nonmalicious reasons (testing, or expose weaknesses) black-hat hackers: break into systems to destroy information or for illegal gain gray-hat hackers: they often illegally break into systems merely to flaunt their expertise or sell their services

What is a packet analyzer and who uses it?

a program deployed by hackers that examines each packet and can read its contents

Be familiar with different general malwares: viruses, spyware, and adware such as Trojan horses, worms, botnet, time bombs, logic bombs, boot-sector viruses, and ransomware. pt 2

boot-sector virus: replicates itself onto a hard drive's master boot record master boot record: a program that executes whenever a computer boots up, ensuring that the virus will be loaded into memory immediately, even before some virus protection programs can load logic bomb: a virus that is triggered when certain logical conditions are met time bomb: a virus that is triggered by the passage of time or on a certain date worm: take advantage of file transport methods script: a series of commands that is executed without your knowledge macro virus: a virus that attaches itself to a document that uses macros

Be familiar with social engineering, phishing, pharming, and scareware?

social engineering: any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information. phishing: lures Internet users to reveal personal information such as credit card numbers, Social Security numbers, or passwords that could lead to identity theft pharming: occurs when malicious code is planted on your computer, either by viruses or by your visiting malicious websites, which then alters your browser's ability to find web addresses scareware: a type of malware that downloads onto your computer and tries to convince you that your computer is infected with a virus or other type of malware

What are: spam, keyloggers, and cookies?

spam: unwanted or junk e-mail keyloggers: monitors keystrokes with the intent of stealing passwords, login IDs, or credit card information cookies: small text files that some websites automatically store on your hard drive when you visit them

How do you prevent virus infections? (antivirus, updates, etc. ).

two main ways: installing antivirus software and by keeping your software up to date

Be familiar with different general malwares: viruses, spyware, and adware such as Trojan horses, worms, botnet, time bombs, logic bombs, boot-sector viruses, and ransomware.

virus: a computer program that attaches itself to another computer program, attempts to spread to control your computer: - trojan horse: a program that appears to be something useful or desirable, like a game or a screen saver, but while it runs it does something malicious in the background without your knowledge backdoor program: hackers can access and delete all the files on your computer, send e-mail, run programs, etc. rootkit: a program that gives an outsider remote control over a computer zombie: computer that a hacker controls, used to launch denial-of-service attacks on other computers denial of service (DoS) attacks: legitimate users are denied access to a computer system because hackers are repeatedly making requests of that computer system through a computer they have taken over as a zombie distributed denial of service (DDOS) attack: launches DoS attacks from more than one zombie (sometimes thousands of zombies) at the same time


Related study sets

ms prepu 42: Assessment and Management of Patients with Obesity 1

View Set

Vol 2 - Geographic Information Systems

View Set

Sociology chapter 1, Sociology Chapter 2, Sociology chapter 3, Sociology chapter 4

View Set

Med-Chem/Pharmacology 2: Antibiotics Part 1 (Continued - EXAM 4) -27Q's

View Set

[Life/Health License] - CH 2 - Underwriting, Issuance and Delivery

View Set

Organic Chemistry Part 1: Conformations of Alkanes and Cycloalkanes

View Set

Chapter 12: Weather and Mass Wasting

View Set

Key Concepts, Chapter 7, Legal Dimensions of Nursing Practice

View Set

Decision Chapter 2 intro To Probability

View Set