Computer Security

Ace your homework & exams now with Quizwiz!

Persistent Cookie

- small text files stored on hard drive Collects information regarding: - user preferences - Password and username information - IP address - Data on web surfing behavior

DoS and DDoS Attacks

DoS Attack: - interrupt network traffic by flooding servers with too many requests DDoS Attack: - most common DoS attack - Botnet sends out illegitimate messages creating huge volumes of network traffic - high volume traffic causes a network crash

Removing Stored Data and Cookies in Safari

1.) Click Remove All Website Data, or click Details 2.) Select one or more websites, then click Remove - If you remove information stored by a website, the website may not be able to provide services it has provided in the past

How to access Windows Firewall

1.) Clicking the Start button 2.) Click Control Panel 3.) Click System and Security, then click Windows Firewall 4.) Adjust Windows firewall settings

Safe Browsing Techniques

- Go incognito: the four most popular web browsers have this mode - be cautious when using social media: open Facebook, click Settings, download a copy of your Facebook data - a Virtual Private Network (VPN) can protect you online identity - HTTPS: check for "https" at the beginning of the URL if you are entering any personal information

Identify Factors that Damage Computer Hardware

- Power surge: lightning or other large electrical input can fry electronics - Protecting a digital device from overheating: heat can severely damage a digital device - Protecting a device from humidity: humidity can negatively impact the performance of a device - Protecting a digital device from magnetic fields: Magnetic fields can influence the flow of electricity in a digital device and impact a computer's hard drive

Managing Cookies in Safari

- Safari accepts cookies and website data only from websites you visit. This helps prevent certain advertisers from storing data on your device - You can change options in Safari preferences so that Safari always accepts or always blocks cookies and other website data - Important: Changing your cookie preferences or removing cookies and other website data in Safari may change or remove them in other apps, including Dashboard

Spam

- an unsolicited email message - spam messages are sometimes called UBE (unsolicited bulk email) and are used for a variety of marketing purposes including selling products and services - messages may contain a variety of malicious programs

How to manage cookies in Google Chrome?

- blocking/allowing cookies by default - deleting cookies - make exceptions for cookies from specific websites or domains

Password Security

- change your passwords frequently - use generic passwords - keep your passwords private - use a combination of letters, symbols, and numbers - check your accounts

Spyware

- collects information about your internet surfing habits and behaviors - includes the collection of keystrokes, passwords, and confidential information - often installed via free downloads or by visiting certain illegitimate websites

Hacktivist

- hacking for a politically or socially motivated purposes - uses same techniques as a hacker, but does so in order to disrupt services and bring attention to a political or social cause

Internet Filter

- firewall software used to block a user's access to specific Internet content The software can reside on a: - router or user's computer - a stand-alone filter attached to a server - Network

How to Diagnose a computer that is impacted by online nuisances

- receiving spam email and bounced back email - frequent pop ups - pop ups start appearing after visiting unfamiliar sites

Cyberterrorist

- uses computers and the internet to launch attacks against computer systems for political or ideological reasons - attacks include the disruption of e-commerce and government sites - the power grid and public utilities have also been targeted

Starting Windows in Safe Mode

- To start a device using Windows OS in safe mode, first click the Windows button - Click the Settings button - If necessary scroll down to view all options - Select Update and Security - Select Recovery - Select Restart now - After rebooting the system, you will enter Windows RE (Recovery environment) - Select Troubleshoot - Select Advanced options - Select Startup Settings - Select Restart - Use number keys or function keys to Enable Safe Mode

Zombie

- a computer controlled by a hacker - groups of compromised computers that are controlled by a hacker are called botnets or zombie armies Hackers use zombies to: - send spam from multiple IP addresses - launch a DoS attack

Cybercrime

- a crime in which a computer is the object of the crime or is used to commit a criminal or offense - Single event: victims endure a single event cybercrime such as unknowingly downloading a Trojan Horse virus - On-going series of events: more serious than single event cybercrimes

Cyberattack

- a deliberate misuse of computers and networks via the internet - cyberattacks use malicious code to modify the normal operations of a computer or network Cyberattacks include the following: - pharming and phishing - spamming and spoofing - spyware - trojans and viruses - identity and information theft - Dos and DDoS attacks

Worm

- a destructive program that replicates itself throughout a single computer or across a network - automatically reproduces itself - designed to attack both wired and wireless networks - replication exhausts network bandwidth or available storage

Keystroke Logger

- a form of spyware that records all actions typed on a keyboard - can be hardware devices and software applications - software based keystroke loggers are often a Trojan that is installed without the user's knowlege - keystroke loggers can record passwords and confidential information

Hacker

- a person who attempts to gain unauthorized access to networks - commonly attempts to steal and corrupt information and data - the term hacker and cracker are synonymous

Email Virus

- a virus that is attached in a file in and sent via email message - when that infected file is opened, the virus infects the computer 3 common types: - Phishing: tricks users into revealing their usernames and passwords by appearing legitimate - Ransomware: when activated, encrypts files on user hard drive and then sells a decryption program - Keystroke logging Trojan: when activated, saves all keystrokes for subsequent transmission to virus creator

Macro Virus

- a virus written in a macro language and placed within a document or spreadsheet - when file is opened the macro virus executed - commands in the macro language set off the destructive events - can be avoided by not downloading or opening the attachment

Firewall

- hardware or software used to keep a computer secure from outside threats such as hackers and viruses - allow or block Internet traffic in and out of a network or computer - the most ideal firewall configuration consists of both hardware and software - personal software firewalls are typically included with the operating system - hardware based firewalls can be purchased as a stand-alone product

How a Virus Infects a Computer

- opening an infected email attachment - downloading an infected file from the internet - sharing infected files - visiting a contaminated website - disguised as images, audio, or video files

Managing Cookies in Firefox

Cookies can store a wide range of information including: - personally identifiable information (name, address, email, phone number) - this information can only be stored if you provide it

Password

- a secret code used to help prevent unauthorized access to data and user accounts - used to secure computers, networks, software, personal accounts, and digital devices - only identify the authenticity of the password, not the use - the terms passcode and key code are synonymous for password

Script Kiddie

- amateur computer hackers with little programming expertise - illegally gain access to computer systems using programs (scripts) that others have written - do not have the skill or experience to write their own programs

Spam Filter

- computer software that is designed to prevent spam messages from entering into a user's email inbox - also known as spam blockers or anti-spam utilities - searches for spam by monitoring suspicious work patterns and frequencies

How do I delete cookies in Google Chrome?

1.) Click the Chrome menu on the browser toolbar (right upper corner of the screen) 2.) Select Settings 3.) Click Show advanced settings 4.) In the Privacy section, click the Content Settings button 5.) In the Cookies section, change the following cookies settings: 6.) Click All cookies and site data to open the Cookies and site data dialog 7.) To delete all cookies, click Remove all at the bottom of the dialog. To delete a specific cookie, hover with your mouse, then click the X

Trojan

- a program that appears legitimate but executes an unwanted activity when activated - often used to find passwords, destroy data, or to bypass firewalls - similar to viruses, but do not replicate themselves - often found attached to free downloads and apps

Managing Cookies

- determine what cookie settings are preferred - cookie settings must be adjusted in each browser you use Cookie settings in web browsers: - delete cookies - block/customize cookies - allow cookies

Network Address Translation (NAT)

- developed by Cisco, is used by firewalls, routers, and computers that are part of a network and are connected to the Internet - used in firewalls to provide protection from outside network intrusions by hiding internal IP addresses - Can be used to prevent many types of network attacks, but in order to maximize security it must be used in conjunction with the firewall built into the router or the firewall provided by the OS

How do Firewalls Work

- filter all information coming through the Internet to your network or computer system There are a variety of techniques that are used to minimize the risk of harmful intrusions into a computer or network including: - Packet Filters: a packet filter inspects each packet leaving or entering a network - Proxy Server: intercept all messages between client and server

Cyberbullying

- harassing using digital devices and networks in a repeated and deliberate manner - includes (among others) emails, blogs, texts, web pages, and blogs with the intention of harming another person - Cyberstalking is a form of cyberbullying

Where to download antivirus software?

- if you know the name of the software vendor you can download the software directly from their website - a popular option for free antivirus software is: www.download.cnet.com (part of the Cnet family) - When downloading software from any site it is important to think before you click. Many software download sites have links to other areas and sites

Phishing

- illegitimate use of an email message that appears to be from an established organization - often contain the company's logo and identifying informatoin - use legitimate looking email messages to con a user into giving up private information

Ransomware

- makes a computer's data inaccessible until a ransom payment is made - encrypts data, forcing victim to buy an decryption code - payment is made using Bitcoin or prepaid cards Attacks usually come via: - Trojan: a legitimate looking email - Worm: in a computer network - an alternative version of a ransomware threatens to make the victim's confidential files public

White Hat Hacker

- non-malicious computer security experts - test the security measures of an organization's information systems to ensure they are protected against malicious intrusions

Fee based vs Free antivirus software

- one of the main differences is the number of features - many free antivirus programs come with advertising - most of the free antivirus programs performed almost as effectively as their fee based counterparts

How does Antivirus Software work?

- one popular technique used by antivirus programs is to look for a virus signature - a virus signature is the software code of a particular computer virus - the antivirus program compares its database of known virus signatures with the files on a digital device and on removable media - once the virus is identified the antivirus software attempts to remove the virus from the file

Online Nuisances

- online nuisances are annoying software programs that can slow down the operations a computer, clog email inboxes, and lead to the theft of information and money Online Nuisances include: - spam - spyware - phishing and pharming - trolling and spoofing

Cookie

- small text file of information created by websites you visit that your web browser stores on your hard disk First-party Cookie - created by visited websites to optimize browsing Third-party Cookie - created by a website other than the one you are currently visiting and are used to track our surfing habits

Computer Virus

- software than infects computers - created using computer code - typically must be "run" to attack and do damage - can destroy programs or alter the operations of a computer or network

Adware

- software that collected the user's web browsing history - data is collected to create unsolicited targeted pop up advertisements - adware often accompanies downloaded programs

Session Cookie

- stored in temporary memory and is lost when the browser is closed - determine the start and end of a session - analyze and measure traffic on a web page - determine the web browser being used

Rootkit

- type of malware that hides in the operating system and is triggered each time you boot your computer A rootkit allows a remote user to: - install rogue files - use and take control of the computer by creating a "backdoor" that bypasses security - delete files

Password Management

- use a strong password and to never use the same password twice - experts suggests using password management software to keep your passwords safe

How do I block cookies in Mozilla Firefox?

1.) Go to the website you wish to block from setting cookies in Firefox 2.) Right-click within the page and select View Page Info. In the Page Info window, select the Permissions panel 3.) Underneath Set Cookies, remove the check mark from Use default 4.) Change the setting to block and close the Page Info window and remove any cookies that the website has already set in Firefox

How do I setup an Internet filter in Microsoft Windows?

1.) Navigate to the Control Panel, and then, under User Accounts and Family Safety, clicking Set up parental controls for any user 2.) Click the standard user account that you want to set Parental Controls for. If the standard user account isn't set up, then click Create a new user account 3.) Under Parental Controls, click On, enforce current settings 4.) With Parental Controls for your standard user account, you can adjust time limits and access to specific programs and web sites

Deleting cookies in Internet Explorer

1.) On the Start screen, click Internet Explorer 2.) Swipe in from the right edge of the screen, and tap Settings (If you're using a mouse, point to the lower-right corner of the screen, move the mouse pointer up, and then click Settings) 3.) Click options, and then under History, click Select 4.) Select the Cookies check box, and then click delete

How do Computer Viruses Work?

1.) Virus arrives via email attachment, file download, or by "clicking" in an infected website 2.) An action triggers the virus 3.) The virus spreads to other computer/devices or network 4.) The activated virus starts its destructive actions

How do I delete cookies in Mozilla Firefox?

Click the menu button, choose History, and then Clear Recent History... 1.) Set Time range to clear to Everything 2.) Click on the arrow next to details to expand the list of history items 3.) Select Cookies and make sure that other items you want to keep are not selected 4.) Click Clear Now to clear the cookies and close the Clear Recent History window

Virus Symptoms

Computers infected with a virus exhibit many symptoms including: - OS doesn't launch properly - files get deleted or encrypted - strange error messages or pop up ads - documents won't save - computer runs notably slower - programs launch on their own

Malware

Designed to: - steal information - destroy data - incapacitate a computer or network - frustrate the user Common types of malware: - viruses - worms - trojan horses

Protecting a Digital Device from Power Surges and Voltage Differenecs

- Surge Protector: use a surge protector when charging a digital device - Uninterruptible Power Supply (UPS): Provides surge suppression and a battery power backup in the event of a power failure - Voltage differences when traveling: US uses 110 volts, many other countries use 220 volts

Firewall Options

- a firewall is an application that executes different tasks than those executed by antivirus or anti-malware apps - firewalls help prevent against worms and hackers, antivirus apps help protect against viruses, and anti malware apps help protect against malware - you need all three applications in order to be fully protected - you only need one firewall app on your PC - both Windows OS and Mac OS X come with firewall software

Antivirus Software

- antivirus software is a computer program that is used to scan files to identify and remove computer viruses and other malicious programs - antivirus programs use a variety of techniques to identify and remove viruses and malware - two of the most common techniques are using signature-based detection and heuristic-based detection - other techniques include behavioral detection and cloud-based detection

Black Hat Hacker

- break into computer systems with the intent of causing damage or stealing data - also known as hackers or crackers - Richard Stallman invented the definition to express the maliciousness of a criminal hacker versus a white hat hacker who performs hacking duties to identify places to repair

How to Diagnose if your System has been Hacked

- fake antivirus messages: if you notice these messages power down your computer, and reboot your computer in safe mode. Then run your antivirus program - unwanted browser toolbars - frequent random popups - fake emails or social media messages from your account

How to Avoid Viruses

- install the latest antivirus software and update frequently - surf the web and download content safely - only visit trusted sites - remove any USB drives, and DVDs before booting your computer - purchase a new router every other year to ensure you have the latest firewall protections - adjust your web browser's security settings to allow browsing only on trusted sites - never bypass your browser's built in security features

Packet Sniffer

- specialized hardware or software that capture packets transmitted over a network - legitimate sniffers are used for routine examination and problem detection - unauthorized sniffers are used to steal information - packet sniffers can be very difficult to detect

What are the privacy risks associated with cookies?

- websites can collect your information and sell it to third-parties - websites can track your surfing behavior and create a user profile - corporate and government entities can monitor your Web behavior

How do I setup an Internet Filter for Mac OS X

1.) Choose Apple menu - System Preferences, Parental Controls. When you open Parental Controls preferences, if you see the message There are no user accounts to manage, see Add a managed user 2.) Click the lock icon to unlock it, then enter an administrator name and password 3.) Select a user, click Enable Parental Controls. If the user isn't in the list, click Add, then create a new user

Set Restrictions in Mac OS X

1.) Choose Apple menu - System Preferences, then click Parental Controls 2.) Click the lock icon to unlock it, then enter an administrator name and password 3.) Select a user, then click one of the tabs along the top: - Apps - Web - People - Time Limites

Adjusting Cookie Settings in Windows Edge

1.) Open Microsoft Edge 2.) Press the three-dot More actions button on the top right 3.) Select Settings from the menu that shows up then tap or click View Advanced Settings 4.) Press the drop down arrow then select Block All Cookies or Block Only Third Party Cookies

How do I allow cookies in Internet Explorer?

1.) Open the Desktop and then tap or click the Internet Explorer Icon on the taskbar 2.) Tap or click the Tools button and then tap or click Internet Options 3.) Tap or click the Privacy tab, and under Settings, move the slider to the bottom to allow cookies, and then tap or click OK - blocking cookies might prevent some pages from displaying correctly, or you might get a message from a site letting you know that you need to allow cookies to view that site

How do I customize cookie settings in Internet Explorer?

1.) Open the desktop and then click the Internet Explorer icon on the taskbar 2.) Click the Tools button and then tap or click Internet options 3.) On the privacy tab, do one or more of the following: To set what types of cookies are blocked or allowed, move the slider. To block or allow specific websites, click Sites. To import privacy preferences file, tap or click import. To override your privacy settings for certain types of cookies, click Advanced. To reset privacy settings to their original level, click Default 4.) When you're done, click OK

How do I block cookies in Internet Explorer?

1.) Open the desktop and then click the Internet Explorer icon on the taskbar 2.) Click the Tools button, and then click Internet options 3.) Click the Privacy tab, and under Settings, move the slider to the top to block all cookies, and then click OK


Related study sets

Business Networks Chapter 10 edit

View Set

Intro to criminal justice: exam 2 (Chapters 8-14)

View Set

SEC+ 601 Chapter 12: Network Security

View Set

Lecture 5 + 6 (Synapse formation)

View Set

MKTG test 2 ch 6, MKTG ch 3, Marketing 351 Chapter 1, Marketing, MKTG Chapter 1, MKTG Chapter 5, MKT 230 - chp. 5

View Set

Money creation/monetary policy chapter 11

View Set