comp security

Ace your homework & exams now with Quizwiz!

How to diagnose if ur systems been hacked

-fake antivirus messages- if u notice these, power down ur comp and rebook in safe mode. In safe mode run ur antivirus program - unwanted browser toolbars frequent random popups fake emails or social media messages from your account

How do computer viruses work

1 Virus arrives via email attachment, file download, or by clicking in an infected website 2 An action trigger the virus 3 the virus spreads to other computer/devices or network 4 the activated virus starts its destructive actions

Starting a windows comp in safe mode

1 click the windows button 2. click settings 3scroll to view all options 4update and security 5 recovery 6 restart now 7 after rebooting the system, you will enter windows re (recovery environment) 8 trouble shoot 9 adv options 10 startup settings 11 restart 12 use number or function keys to enable safe mode

customize cookies

1 open the desktop and then tap or clikc the internet explorer icon on the taskbar tap or click the tools button and then tap or click internet options on the privacy tab,

how do i allow cookies in internet explorer

1 open the desktop and then tap the inetexpl icon on the taskbar 2 tap the tools button then internet options 3 tap the privacy tab and under settings, move the slider to the bottom to allow cookies, and then tap or click OK.

internet explorer delete cookies

1 tap to open internet explorer/edge swipe in and tap settings tap options then under history click select select cookies then delete

Cyber Crime

A crime in which a computer is the object of the crime or is used to commit a criminal offense

Keystroke logger

A form od spyware that records all actions typed on a keyboard can be hardware devices and software applications software based keystroke logger are often a trokan that is installed without the user's knowledge key stroke loggers can record passwords and conf info

Macro virus

A virus written in a macro lanf and plaved within a doc or spreadsheet when file is opened the macro virus is executed commands in the macro lang set off the destructive elements can be avoided by not downloading or opening the attachment

Spyware

Collects info about ur internet surfing habit and behaviors includes the collection of keystrokes, passwords, and conf info Often installed via free downloads of by visiting certain illegitimate websites

What to do if u get a phishing message

Do not give out personal info if you receive a suspicious message, contact the institution that the message was allegedly sent from report the incident to US CERT

Dos and DDoS attacks

DoS attack: Interrupt network traffic by flooding servers with too many requests DDos : Most common dos attack botnet sends out illegitimate messages creating huge volumes of network traffic high volume of traffic causes a network crash

how do firewalls work

Filter all info coming thru the internet to ur network or comp system there are a variety of techniques that are used to minimize the risk of harmful intrusions into a computer or networking including packet filters- a packet filter inspects each packet leaving or entering a network proxy server- intercept all messages between client and server

internet filter

Firewall software used to block a user's access to specific internet content software can reside on a computer stand alone filter attached to a server network

Ransomware

Makes comps data inaccessible until a ransom payment is made encrypts data, forcing victim to buy a decryption code. Payment is made using bitcoin or prepaid cards Attack usually comes via trojan- legit looking email worm- in a comp network an alternative version of a ransomware threatens to make the victim's confidential files public

Pharming

Phising that seeks to obtain personal info thru malicious software that is inserted on a victims comp redirects the user to a phony web page when users reach the fake web page they are encouraged to enter the personal info

Packet Sniffer

Specialized hardware or software that capture packets transmitted over a network sniffers examine each packet passing thru a router gateway and search for specific data legitimate sniffers are used for routine examination and problem detection Unauthorized sniffers are used to steal info packet sniffers can be very diff to detect

Single event cyber crime

Victims endure a single event cybercrime such as unknowingly downloading a Trojan horse virus

Zombie

a comp controlled by a hacker groups of compromised comps that are controlled by a hacker are called botnets or zombie armies hackers use zombies to send spam from multiple ip addresses launch a dos attack

spam filter

a comp software that is designed to prevent spam messages from entering into a user's email inbox Spam filters are known as span blockers or anti spam spam filters search for spam by monitoring suspicious word patterns and frequencies

Cyber attack

a deliberate misuse of comps and networks via the internet. use malicious code Cyberattacks use a malicious code to modify the normal operations of a computer or network Cyberattacks include the following Pharming and ohishing spamming and spoofing spyware trojans and viruses identity and information theft dos and ddos

Worm

a destructive program that replicates itself throughout a single comp or across a network automatically reproduces itself designed to attack both wired and wireless networks replication exhausts network bandwidth or available storage

firewall options

a firewall is an app that executes diff tasks than those executed by antivirus or anti-malware apps. Firewalls help protect against worms and hackers, anti-virus apps help protect against viruses anti-malware apps help protect against malware. You need all 3 to be fully protected

Hacker

a person who attempts to gain unauthorized access to networks commonly attempts to steal and corrupt info and data the term hacker and cracker are synonymos first network of hackers cap'n crunch (john draper)

Trojan

a program that appears legit but executes an unwanted activity when activated often used to find passwords, destroy data, or to bypass firewalls similar to viruses, but do not replicate themselves often found attached to free downloads and apps

managing cookies in mozilla firefox

according to mozilla, cookies store: personally identifiable info info can be stored if u provide it

Script Kiddie

amateur comp hackers w little programming expertise illegally gain access to computer systems using programs (scripts) that others have written do not have the skill or experience to write their own programs

Online nuisnaces

annoying software programs that can slow down the ops of a comp, clog email, lead to the theft of info and money ex spam spyware phishing and pharming trolling and spoofing

email virus

attached in a file in and sent via email message. When that file is opened, the virus infects the comp 3 types: phishing- tricks users into revealing usernames and passwords by appearing legit ransomware- when activated encrypts files on user hard drive and then sells a decryption program keystroke logging trojan- when activated, saves all keystrokes for subsequent transmission to virus creator

Managing cookies in google chrome

blocking/allowing cookies by default deleting cookies make exceptions for cookies from specific websites or domains

Black hat hacker

break into comp systems with the intent of causing damage or stealing data aka hackers or crackers richard stallman invented the def to express the maliciousness of a criminal hacker vs a white hate hacker

Network Address translation NAT

by cisco, used by firewalls, routers, and comps that are part of a network connected in the intenret used in firewalls to provide protection from outside network intrusions by hiding internal ip addresses can be used to prevent many types of network attacks but in order to maximize security it must be used in conjunction with the firewall built into the router or the firewall provided by the os

password tips and techniques

change ur password frequesntly use generic passwords keep your password private use a comb of letter, symbols, and numbers, check ur accounts

delete cookies in chrome

click chrome menu settings show adv settings privacy section, content settings cookies section change: all cookies and data to open remove all click x

remove cookies or stored data in safari

click remove all website data select and remove

Antivirus software

comp program that is used to scan files to identify and remove computer viruses and other malicious programs common techniques are using signature based detection and heuristic based detection other techs include behavioral detection and cloud based detection

Virus symptoms

comps infected w a virus exhibit many symptoms: os doesn't launch properly Files get deleted or encrypted Strange error messages or pop up ads docs wont save comp runs slower programs launch on their own

How to turn on parental controls

control panel, user friendly accounts, set up click the one ya want under p cs click on pc, can limit time and access

Managing cookies

determine what cookie settings are preferred cookie settings must be adjusted in each browser you use cookie settings in web browsers delete cookies block/customize cookies allow cookies

Blocking cookies in firefox

go to website u wanna block view page info, permissions pannel set cookies, remove check mark from use default change settings to block

Hacktivism

hacking for a politically or socially motivated purposes Uses same techniques as a hacker but does so in order to disrupt services and bring attention to a political or social cause

Cyberbullying

harassing using digital devices and networks in a repeated and deliberate manner includes (among others) emails, blogs, texts, with the intension of harming another person cyberstalking is a form of cyberbullying

Firewall

hardware or software used to keep a comp secure from outside threats such as hackers and viruses allow or block internet traffic in and out of a network or computer the most ideal firewall configuration consists of both hardware and software personal software firewalls are typically included with the operating system hardware based firewalls can be purchased as a stand alone product

Phishing

illegitimate use of an email message that appears to be from an established orgainization often contain the comps logo and identifying info use legitimate looking email messages

safe browsing tatics

incognito be cautious when using social media Virtual private network VPN can protect ur online identity HTTPS check for it

Avoiding viruses

install the latest antivirus software and update it surf the web and download content safely only visit trusted sites removes any usb drives and dvds before booting your comp purchase a new router every other year to ensure you have the latest firewall protections adjust your web browders security setings to allow browsing only on trusted sites never bypass your browser's built in security features dont use a discarded hard drive

how antivirus works

look for sig (code of virus) once its identifed the software tries to remove the file

fee based vs free antivirus software

main diff is number of features free comes with ads most of the free were just as effective

White hat hacker

non malicious comp security experts test the security measures of an organization's info systems to ensure they are protected against malicious intrusions

On-going series of events cyber crime

on going series of events more serious than single event cyber crimes: cyber stalking, child predatation

adjusting cookie settings in microsoft edge

open m edge press 3 dot more button settings, view adv settings drop down select block all cooks or b all 3p cooks

block cookies internet expl

open the desktop and then tap internet explorer icon tap tools button then internet options tap privacy tab and block

How viruses can infect a digital device

opening an infected email attachment downloading an infected file from the internet sharing infected files visiting a contaminated website disguised as images, audio, or video files

damage comp hardware

power surge protecting a digital from overheating- heat can hurt protecting from humidity- humidity sucks for comps protecting a dd from magnetic fields-

how to diagnose the effects of online nuisances

receiving span emails and bounced back email frequent pop ups while searching the web pop ups start appearing after visiting unfamiliar sites

Password

secret code - used to secure many things doesnt identify the authenticity of user terms passcode and keycode are synon 4 passw

fire fix delete cookies

set time range to clear everything explain history list select cooks and other items click clear

Malware

short for malicious software designed to steal info destroy data incapacitate a comp or network frustrate the user common malware viruses worms trojan horses

Cookie

small text file of info created by websites u visit that ur web browser stores on ur hard disk First-Party cookie created by visited websites to optimize browsing Third-party cookie created by a website other than the one you are currently visiting and are used to track your surfing habits

persistent cookie

small text files stored on hard drive collect info reguarding user preferences password and username info ip address data on websurfing behavior

Adware

software that collects the user's web browsing history data is collected to create unsolicited targeted pop up ads adware often accompanies downloaded programs

Computer virus

software that infects computers created using comp code typically must be run to attack and do damage can destroy programs or alter the op of a comp or network

Session cookie

stroed in temp memory and is lost when the browser is closed determine the star and end of a session analyze and measure traffic on a webpage determine the web browser being used

protecting a dd from power surges and volt differences

surge protector uninterruptiple power supply UPS - surge suppression and power backup voltage diffs when traveling

apple parent controls

sys pref, pc lock icon select user and enable

Rootkit

type of malware that hides in the operating system and is triggered each time you boot your computer a rootkit allows a remote user to install rogue files use and take control of the comp by creating a backdoor that bypasses security delete files

Spam

uncolicited email sometimes called UBE unsolicited bulk email and are used for a variety of marketing purposes including selling products and services messages may contain a variety of malicious programs

password management

use a strong password and never use the same password twice experts suggest using password management software to keep passwords safe

Cyberterrorist

uses computers and the internet to launch attacks against computer systems for political or ideological reasons. Attacks include the disruption of e-commerce and gov sites the power grid and public utilities have also been targeted pentagon 1,000 hack attempts per day

Spectre and meltdown

vulnerabilities impacting computer chips allows unauthorized reading of processor memory could allow a hacker to use apps to change a processors os no single patch can fix these so user should expect to install a number of updates as required

where to download antivirus software

website download.cnet.cim think before you click

privacy risks with cookies

websites can collect your info and can sell it to 3rd parties websites can track ur surfing behavior and create a user profile corporate and gov entities can monitor your web behavior

cookies in safari

you can change options in safari preferences so that safari always accepts or blocks cookies and other website data important: changing ur cookie prefs may change them in other apps

windows firewall

you can customize four settings for each type of network location in windows firewall 1 start 2 control panel 3 system and security, windows firewall 4 adjust windows firewall settings


Related study sets

Homework: Chapter 12: Nervous System

View Set

BA 206 Management Fundamentals, Ch. 7 Organizing for Action

View Set

Chapter 29: The Child with Musculoskeletal or Articular Dysfunction

View Set

The Turbulent Sixties Quiz Chp 29

View Set

BAS 282: Advertising and Sales Promotion: SmartBook

View Set

Study Guide 6 - Part One - Identifying Accounting Terms

View Set

Ch 3 - Electronic Business (E-Business) Systems

View Set

Water and Carbon Cycles - The Amazon Rainforest

View Set