IC3 Lesson 7: Security and Maintenance

Ace your homework & exams now with Quizwiz!

What is a "backup"?

A BACKUP is a duplicate copy of a program, a disk, or data, made for archiving (reference) purposes or for safeguarding the data from loss if the original is damaged or destroyed.

What is a "Certificate Authority"?

A CERTIFICATE AUTHORITY (CA), which is a third party, is responsible for verifying the legitimacy of the digital certificate.

What is a "cookie"?

A COOKIE is a small text file placed on your computer by a Web server. It can be used to store user names and passwords and can track your activity on the Web. Cookies can potentially be stolen by a spyware program or a hacker.

What is a "desktop firewall"?

A DESKTOP FIREWALL (or PERSONAL FIREWALL) is software that protects an individual system instead of a network. Many operating systems include built-in desktop firewall software.

What is the purpose of a "digital certificate"?

A DIGITAL CERTIFICATE is a small file that provides the identity of an individual or company over the internet.

What is a "firewall"?

A FIREWALL is a security barrier that filters and controls the flow of information coming in and going out of a private network.

What is a "hacker"?

A HACKER is someone who tries to get unauthorized access to a computer system.

What is a "restore point"?

A RESTORE POINT is a saved snapshot of your computer's Window system files, program files, and Windows registry settings at a specific point in time. User files are not included in a restore point.

What is a "system image"?

A SYSTEM IMAGE is an exact image of a hard drive at a point in time. It includes Windows and your system settings, programs, and files. If you restore your computer from a system image, it is a complete restoration and you cannot choose individual items to restore.

What is a "Trojan" designed to do?

A TROJAN (or TROJAN HORSE) is a program designed to allow a hacker remote access to a target computer. The computer code for a Trojan is hidden inside an application, such as a game.

What is a "virus" designed to do?

A VIRUS is a program designed to take control of your system operations and damage and/or destroy data.

What is a "VPN"?

A VPN is a VIRTUAL PRIVATE NETWORK, which provides a way to allow authorized connections to a company network from the outside. A VPN is an encrypted connection between two computers, which allows secure, private communication using the internet as a pathway. It is used by employees who are out of the office and by those in satellite offices.

What is a "worm" designed to do?

A WORM is a self-replicating program (it creates more copies of itself) that uses up system and network resources.

Where should you NOT keep a backup file?

A backup should NOT be stored on the same drive as the original copy.

What DOESN'T a firewall do?

A firewall does NOT encrypt data or protect against viruses.

Are public wired networks considered safe to use? Why/Why not?

A public wired network is not safe to use because you are exposing your computer to all of the computers (and people and malware) on the network.

What should you use to make strong password?

A strong password should be easy for you to remember and hard for other people to guess. Longer passwords with letters (lowercase and capitals), numbers, and symbols are more secure. Do not use variations of publicly available information such as your birth date, address, spouse or children's names, etc.

What kind of damage can a worm do?

A worm can use up system and network resources.

What is "adware" designed to do?

ADWARE is software that automatically displays or downloads ads.

What is "authentication"?

AUTHENTICATION is the process of confirming the identity of a user or computer system.

What kind of damage can a Trojan do?

After a Trojan is installed, it can allow a hacker to take control of the target computer, steal information, install other software, download or upload files, or crash the system.

How do you use antivirus software?

Antivirus software enables you to scan your computer for known viruses and eliminate those that are found. Scans can be done manually or automatically, and free frequent updates are included with the application. Updates are able to identify new viruses, so you should run the antivirus software again after installing an update.

What is "encryption"?

ENCRYPTION is the process of converting the data being transmitted to an unreadable form before sending it and then decrypting it (changing it back to a readable form) upon receipt.

What does "File History" automatically do?

FILE HISTORY is the main backup tool in Windows 10 for your personal files. It automatically stores a version history of your files, allowing you to restore a previous version of a file if needed.

How do you restore a personal file from OneDrive?

If the backup copy is in OneDrive, copy the required file from the OneDrive folder and paste it to your hard drive using File Explorer.

What do a https Web address and lock icon indicate?

If you see "https" in the Address Bar (where the URL is displayed) and a lock icon, it means you are in a secure area of the Web site and that transactions are encrypted and can be conducted safely.

How do you restore a personal file from Backup and Restore?

If you used Backup and Restore: Open the Control Panel/System & Security/Backup and Restore (Windows 7)/Restore my Files. Select the file(s), click "Next", specify the location, then click "Restore" and "Finish".

How do you restore a personal file from File History?

If you used File History to backup the file: Open Settings/Update & Security/Backup/More options. Then click on "Restore file from a current backup" (at bottom of window). Select the file and click on the green button.

What is the difference between "logging off" and "locking" your computer?

LOGGING OFF your computer closes your files and signs you out of your user account. When you LOCK your computer, your programs and files remain open, but you need to sign into your user account to resume working.

What are the major types of "malware" that are designed to damage your operating system, applications and files?

MALWARE (MALicious softWARE) include: (a) viruses, (b) worms, (c) Trojans, and (d) spyware or adware. ["Malicious" means having an intent to harm someone or something]

What does "network monitoring software" do?

NETWORK MONITORING SOFTWARE tracks and records network activity such as user logons, server performance and network traffic conditions.

What is "phishing"?

PHISHING is the process of trying to gather sensitive information, such as a password or credit card details, from a victim by pretending to be someone trustworthy. A PHISHER sends a legitimate-looking email message that seems to come from a legitimate source. The email instructs you to visit a (fraudulent) web site and enter your account information, which the phisher then captures.

What are some connection issues you should check when you are having a problem with your device?

Possible connection issues are: Do you have a valid IP address? Try restarting your modem and router. If you are having trouble with a Wi-Fi network: Is your wireless adapter turned on? Has the Wi-Fi network password changed? Are you close enough to the Wi-Fi hotspot? See lesson for more detailed questions.

What are some hardware issues you should check when you are having a problem with your device?

Possible hardware issues are: Is there power? Is there a good connection? Is there a problem with an external device, such as a printer? See lesson for more detailed questions.

What are some software issues you should check when you are having a problem with your device?

Possible software issues are: Did you install an update recently? Is an application up to date? Do you have a virus? See lesson for more detailed questions.

Are public Wi-Fi networks considered safe to use? Why/Why not?

Public Wi-Fi connections are also not safe to use, because you are exposing your computer to all of the computers (and people and malware) on the network.

What does "redundant" mean?

REDUNDANT usually means "repeating something else and therefore unnecessary", e.g. "He edited the article and removed the redundant information." A second meaning is: "used to describe a part of a machine that duplicates the function of another part and exists so the entire machine will not fail if the first part fails", e.g., "The backups must be redundant."

What does "refreshing" a PC mean?

REFRESHING a PC gives you a fresh installation of Windows without deleting your personal files, settings or apps downloaded from the Windows store. Other applications will be removed.

What does "resetting" a PC mean?

RESETTING a PC gives you a fresh installation of Windows and saves NOTHING. It restores the PC back to its factory default state.

What does "resetting" a mobile device do?

RESETTING a mobile device restores the device to the state it was in when it left the factory. It removes all personal files, apps, and any customizations you added such as accounts, files, passwords, etc.

What are examples of recommended places where you can keep backups?

Recommended places for storing backups are a different internal hard drive, an external hard drive, a flash drive, CD or DVD, or a network or cloud location.

How do you restore a personal file that was deleted or corrupted?

Restoring a personal file that was deleted or corrupted depends on the method you used to make the backup copy.

What is "social engineering"?

SOCIAL ENGINEERING is the practice of tricking users into giving out passwords or other access information. Social engineers act as if they are friendly, or are fellow employees, to gain the trust of people.

What is "spyware" designed to do?

SPYWARE is a program that is placed on a computer without the owner's knowledge or consent in order to collect personal and private information from the computer.

What does "PC surveillance software" do?

Sometimes IT administrators install PC SURVEILLANCE SOFTWARE which records all PC activity, including keystrokes, screenshots, email, instant messages, and web activity. When you work for a company or organization, the computer they give you is their property and your activities on that computer are not private.

How is spyware transmitted?

Spyware can be spread in internet-based or internet-downloaded applications or by a virus.

What kind of damage can spyware do?

Spyware secretly monitors your activity on the internet and sends information to the spyware originator. It can scan files, monitor keystrokes, install other spyware, and change the default home page in a browser.

What is "troubleshooting"?

TROUBLESHOOTING is figuring out how to solve a problem on your computer using an organized, logical approach.

How does a firewall work?

The filters used by a firewall are sets of rules that define and control the traffic that is allowed to be transmitted and that which is blocked.

Businesses that handle people's personal information are required to follow rules regarding backups. What are some things they have to do?

They are required by law to maintain and to secure backups for a certain number of years. The backups must be REDUNDANT (at least one copy of the backup must be in another physical location); the off-site storage location must be SECURE; backups should be ENCRYPTED and VERIFIED (checked to make sure the information is accessible and complete).

How do you change your Windows password?

To change your Windows password: Click on Start/Settings/Accounts/Sign-in Options. Then under "Password", click "Change", type your old password, and then click "Next". Type your new password twice, then click on "Next" and "Finish".

How can you protect yourself from phishing?

To protect yourself: (a) enable anti-phishing features in your browsers, (b) independently check out the Web site you are sent to, (c) avoid clicking on links in email messages, and (d) before logging on to a secure site, check that the URL (Web address) is legitimate.

How do you set up Windows Backup and Restore?

To set up Windows Backup and Restore: Open the "Control Panel" and go to "System & Security". Click "Backup and Restore (Windows 7)", then "Set up backup". Select the destination for the backup, then click "Next", and then "Next" or "Let me choose". Click "Save settings and run backup".

How is a Trojan transmitted?

Trojans are installed on the target system when the user runs an infected program, opens an infected email attachment, or uses a Web page containing certain kinds of code. Trojans don't replicate themselves or spread to other files and disks.

How does VPN work?

VPN works by providing "remote access" (connecting from outside the network) using AUTHENTICATION and ENCRYPTION. There must be a VPN server to receive incoming connections and VPN client software installed on the remote computer to make the connection.

How is a virus transmitted?

Viruses are created by people and spread when a user opens an infected email attachment, downloads a program or file, or uses infected removable media.

What kind of damage can a virus do?

Viruses can use all your memory, slow computer speeds, corrupt or destroy files, and erase content.

What do you use "Windows Backup and Restore" for?

WINDOWS BACKUP AND RESTORE can be used to back up the entire system or only the files and folders you select. By default, backups are created on a regular schedule, which can be changed.

How can you protect yourself when you use a public computer?

When you are finished using a public computer, always log out of all online accounts, clear caches and cookies, and log out of the operating system.

What should you remember if/when you shop on the web?

When you shop on the web, shop at companies that have a good reputation and display links to their privacy policy and terms and conditions. Be skeptical (doubt the truth) of offers that are "too good to be true".

How can you protect yourself when you connect to a public network?

Whenever you connect to a public network, always identify the network to the operating system as a public network because then Windows will limit incoming connections, while still allowing you access to the Internet.

How is a worm transmitted?

Worms are usually transmitted over the internet in email attachments. They spread by themselves from one computer to another on a network and don't require any human interaction, as viruses do.

How can you keep your accounts safe?

You are responsible for actions performed in your account, so you want to prevent unauthorized access. Don't share your information or keep a record of names and passwords near your device. Change your information periodically. Do not use the same password for multiple accounts.

How do you backup your mobile data?

You can backup your mobile data by using a USB cable and copying the data to your PC, or use the phone's built-in backup utilities and associated cloud storage. You can turn on automatic backup so that your data is continually backed up.

What are the different ways you can backup your personal files?

You can backup your personal files by: Copying those files to cloud storage, Using "File History" in Windows 10, or Using "Windows Backup and Restore".

How can you protect yourself from social engineering?

You can protect yourself from social engineering by recognizing common social engineering practices, such as acting as a computer technician and sending an official looking email message with instructions to log in or reveal account information.

Why is there a need for security on your computer?

You need security on a computer because when you connect a computer to a network, you expose the operating system and the data on that computer to other computers (and people) on the network. If your computer is connected to the internet, your system and data can potentially be accessed by many more computers (and people).

How do you use "File History"?

You need to configure File History once and then keep the backup media connected. To start, connect an external drive, open "Settings", click "Update & Security". On the left side, click "Backup", then "Add a drive". Click on "More Options" to control which files to backup and how often it should be done.

How should you protect yourself when you receive or download new files?

You should scan all files downloaded from the internet, files on removable media, and scan incoming and outgoing emails and their attachments.

Why should you use a user name and password?

You should use a user name and password because they protect your user account from unwanted access. You should keep them confidential so that other people cannot use them to access your data.


Related study sets

TestOut Linux Pro Practice Questions (Ch. 1-4)

View Set

Environmental Biology- Major Quiz 4

View Set

MISY 160 Exam 3 University of Delaware

View Set

PrepU ch 40 Fluid, Electrolyte and Acid-Base Balances

View Set

Chapter 48: Management of Patients With Intestinal and Rectal Disorders NCLEX

View Set