Connect Ch 5 Security

Ace your homework & exams now with Quizwiz!

categorize other computer terms

first party cookies/ software/ hardware

trojan horse virus

program that appears legit, but executes an unwanted activity when activated is called

TTP stands for

trans-pacific partnership

phishing

tricks users into revealing usernames and passwords by appearing legit

spam filters search for spam by watching for keywords and by monitoring suspicious ___ patterns and frequencies

word

a hacker launches an attack on a network that is designed to interrupt and stop network traffic by flooding it with too many requests. this would be considered what kind of attack?

DoS Attack

who should you notify if you receive a phishing message

US Cert

cybercrime

a crime in which a computer is the object of the crime and is used to commit a criminal offense

b2c

business to consume

derived from the greek word ergon and homi, _________________ is an important element of workplace safety

ergonomics

botnet

group of compromised computers controlled by a hacker

categorize into virus

macro, trojan horse, and worm

experts suggest using password ____________ software to keep your passwords safe

management

categorize into cyberattack

packet analyzer, rootkit, and DOS attack

which are considered intellectual property?

patents/ trade secrets/ trademarks

adware often accompanies downloaded _____________

programs

rootkits

software programs that hide in the operating system and allow for the installation of hidden files

adware

software that collects a users web browsing history to create unsolicited targeted pop-up ads

spyware

software that collects information about your internet surfing habits and behaviors, includes the collection of passwords, account numbers, and keystrokes

packet sniffers

specialized hardware/software that capture packets transmitted over a network

which of the following are online nuisances

spoofing/ spyware/ spam

the title in the DMCA that directly impact digital copyright issues

title 1- WIPO copyright and phonograms treaties and implementation act title 2- computer maintenance compensation assurance title 3- online copyright infringement liability limitation

hacktivating

category of cyberterrorism that focuses on hacking computer systems for politically/ socially motivated purposes

after youve clicked on the privacy tab in safari which of the following are ways to efficently remove cookies and stored data

click remove all web site data or click details then select one or more website, then click remove

an internet filter can be installed on which

computer / router / server

c2c

consumer to consumer

digital identity

digital presence created online by an individual or organization using a digital device

keystroke logger

form of spyware that records all actions typed on a keyboard

internet privacy is a wide hanging term that refers to a variety of considerations including:

how data and information is used, techniques and technologies used to protect sensitive and private data, communications and preferences of who has access to data or information

what is true about trojan malware

often used to find passwords/ destroy data/ bypass firewalls/ often found attached to free downloads and apps/ similar to viruses but do not replicate themselves

cyberterrorist

person who uses computers and the internet to launch attacks against computer systems for a political or ideological reason

typically computer viruses must be what to attack and do damage to a digital device?

run

select the functions of session cookies

determine web browser being used/ analyze and measure traffic on a web page/ determine the start and end of a session

categorize hackers

black hat/ script kiddie/ white hat/ cyberterrorist

black hat hacker

breaks into computer systems with the intent of causing damage or stealing data

white hat hackers

computer experts that attempt to hack into a network to ensure that it is protected against intrusions

antivirus software

computer program that scans files to identify and remove computer viruses and other malicious programs is called

third party cookie

created by a website other than the one you are currently visiting and are used to track your surfing habits and are considered a violation of privacy

intellectual property

human knowledge and ideas that the law protects against unauthorized use by oters

what is true about script kiddies

illegally gain access to computer systems using programs that others have written/ amateur computer hackers with little programming experience

proxy server

intercepts all messages between client and server to help alert a hacker or other intruder from attacking a network.

ransomeware

malware that encrypts a computers data, forcing the victim to purchase a decryption code

developed by cisco and used by firewalls, routers, and computers that are part of a network and are connected to the internet, __________________________ provides a type of firewall protection by hiding the internal IP addresses

network address translation

on what date does the liability of paying for the fraud falls on the party that is least chip-enabled?

october 1, 2015

If your debit card has been compromised U.S. Federal law says you are only liable for a maximum of _____ in fraudulent charges if you tell your bank within two business days of learning about them.

$500

according to microsoft, what is the correct order of steps to accept all cookies in internet explorer

1. open internet explorer 2. click tools icon 3. click internet options 4. click privacy tab 5. under settings, move the slider to the bottom to accept all cookies 6. click apply

steps for parental controls in microsoft windows

1. open parental controls 2. click the standard user account that you want to set parental controls for 3. under parental controls click "on" then enforce current settings 4. adjust time limits, access to certain programs and websites.

steps of a virus infection in the correct order

1. the virus arrives via email attachment, file download, or by visiting an infected line 2. an action such as running or opening the file triggers the virus 3. the payload is activated and the virus starts its destructive activities

the TTP covers just under ____ percent of global GDP

40

according to the FTC, a few united states internet privacy rules/laws of importance are

COPAA and Red flags rule

passports issued by the us and many other countries include

RFID chips

cyberattack

a deliberate misuse of computers and networks via the internet that uses malicious code to modify the normal operations of a computer or network

on a mac home screen, where do you click to access to adjust parental control settings

apple and settings

on a mac home screen, where do you click to access to adjust parental control settings?

apple and settings

DoS

attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests.

b2b

business to business

after you've clicked on the privacy tab in safari, which of the following are ways to efficiently remove cookies and stored data

click remove all web site data, or click details then select one or more websites, then click remove

whats true about spyware

collects information about your internet surfing habits and behaviors/ includes the collection of keystrokes, passwords, and confidential info/ installed via free downloads or by visiting certain illegitament websites

you can change your firefox settings to allow you to

delete stored cookies automatically when you start firefox/ deny cookie storage requests / approve cookie storage requests

symptoms your system has been hacked

fake emails/ social media messages from your account/ redirected internet searches/ unwanted browser tool bars

True or false ; international laws on internet privacy are very similar

false

the main government organization that oversees internet privacy in the us is the

federal trade commission FTC

what is true about macro viruses

initiated by downloaded and opening an infected attachment/ commands in the macro language set off the destructive actions/ when file is opened the macro virus expands

which of the following are ways to prevent computer virus infections?

install latest antivirus software and update frequently/ downloaded content from the web should only come from trusted sites/ web surfing should be limited to trusted sites

categorize online nuisance

phishing/ spoofing/ spyware/ trolling

in the options tab in mozilla firefox, where would you click to adjust cookie settings

privacy-history area

categorize digital identity

purchasing behavior/ social media postings/ online search activities

Once the virus is identified the antivirus software attempts to remove the virus from the file. If the software cannot remove the infected file it will send the file to an isolated area on the hard disk called _____.

quarantine

which of the following are common email viruses

randomware / phishing / keystroke- logging trojan

stored in temporary memory _____________________ are used to analyze and measure traffic on a webpage

session cookies

the software code of a particular computer virus is called the virus

signature

first party cookie

small text file of information created by a website you visit that keeps track of your personal preferences and current web browsing session

web cookie

small text file of information created by websites you visit that your web browser stores on your hard disk

categorize online nuisances

spam/ spyware/ adware

malware is designed for

stealing information, incapacitate a computer or network, and to destroy data

persistent cookie

stored on a users hard drive, a type of cookie that collects information about user preferences, password, and username information, ip addresses, and data on a web surfing behavior

categorize internet privacy

techniques and technologies used to protect sensitive data and information/ how data and information is used/ who has access to data and information

internet privacy

the right of personal privacy concerning the storing, distributing and displaying information concerning oneself via the internet

internet privacy

the right of personal privacy concerning the storing, distributing, and displaying information concerning oneself via the internet is called

true or false: if you adjust cookie settings in chrome your cookie settings in firefox are automatically adjusted to match those of chrome

true

the digital millenium copyright act was signed into law by president clinton in 1998. the act implements

two world intellectual property organization treaties

worm

type of malware that replicates itself throughout a single computer or across a network

rootkit

type of malware triggered each time you boot your computer

pharming

type of phishing that seeks to obtain personal information through malicious software that is inserted on victims computers and directs them to fake webpages

system security area that is accessed by clicking the control panel > system and security. when you click windows firewall, what are some of the firewall settings you can adjust?

update firewall settings / turn windows firewall on or off/ change notification settings

which are protected by intellectual property law against unauthorized user distribution?

video games and movies

which are protected by intellectual property laws against unauthorized clear distribution?

video games and movies

macro virus

virus written in a specific language and placed within a document or spreadsheet

one of the risks with cookies

websites using cookies can collect your information an sell it to 3rd parties

keystroke - logging trojan

when activated, saves all keystrokes for subsequent transmission to virus creator

steps to set parental controls on MAC OS

1. select system preferences, then click parental controls 2. click the lock icon to unlock it, then enter an administrator name and password 3. select a user, then click enable parental controls 4. if the user is not on the list, click add, then fill in the name, account, and password information to create a new user

under the TTP, copyrighted works will pass into the public domain how many years after the creators death?

70


Related study sets

A&P Endocrine System: Hypothalamus & Pituitary Gland

View Set

ACCT 210 chapter 9: PPE (Plant Assets) and how to record accumlated depreciation and deprciation expense

View Set

Business - Module Business Ownership

View Set

11 Steps in the Marketing Research Process

View Set

MANA 3335 (9-13) Learn it & Assignment Questions

View Set

Module 6, Review #6 CH.39 ALZHEIMER'S AND DEMENTIA

View Set