Internet Security Threats

Ace your homework & exams now with Quizwiz!

Botnets

A collection of software robots called zombies that may be remotely controlled, and they generate spam, attach viruses, and spread malware.

worm

A self-replicating malicious code. It spreads itself throughout the network and attaches to hard drives and external storage devices. It often causes extreme damage to network resources.

Pharming

A type of online fraud. It redirects a user to an illegitimate website by making the user believe the malicious site is legitimate, and then the user enters personal data.

Malware

Common methods for accessing network resources with malicious intent. It can delete files, steal sensitive information, and send questionable content messages from your address book, along with taking control of your computer and its resources.

Internet security

Focuses on preventing cyberattacks happening through the internet by concentrating on browser and network security.

risk

How likely you or your assets are of being attacked.

Hacking

Includes efforts taken by an individual to gain unauthorized access to a network.

Trojan Horses

Involve a software package used to masquerade malicious code. It involves a hidden executable file that installs and runs automatically after it is installed. It may delete files, activate resources such as a webcam, and may install spyware.

Viruses

Involves malicious code often received as an email attachment or downloaded as part of another program. It can be downloaded to a computer with the intent of infecting network resources.

Phishing

It involves the creation of fake emails, text messages, and websites created to duplicate a company's web presence. It's when trickery is used to entice you to enter personal and account information.

Spoofing

Often used with phishing attempts. It can employ a website or email address appearing to be legitimate. It may generate spam using your email address book. It can also resemble specific websites, such as a financial institution requesting login and password information.

Wi-Fi eavesdropping

Online monitoring technique used by cybercriminals to intercept and collect personal information over a Wi-Fi connection. It involves listening to a conversation or monitoring computer activity occurring over a non-encrypted Wi-Fi network.

Ransomware

Restricts access to computing resources displaying messages demanding payment to regain access. It may lock your screen access or may encrypt files and storage devices preventing access. If this happens, do not pay, instead contact an IT specialist to determine if computing resources can be repaired and data retrieved.

Intellectual property

The ownership of an individual's ideas or production. This includes artwork, music, movies, etc. and are protected by law.

Security

The precautionary steps taken to protect computing resources against cybercrime.

Computer security

The precautions taken to protect hardware and software components both in the private and commercial worlds.

threat

The presence of anything that can cause damage to your assets or anything you want to protect.

Spam

Unsolicited email or other unwanted correspondence transmitted to unsuspecting individuals. It's an annoyance and creates a burden on internet services. It provides an avenue for executing malware, fraud, phishing, and threats.

Spyware

Used to penetrate and reside within a computer. It collects personal information without your knowledge. It forwards collected passwords, accounts, and computer settings to unauthorized individuals.

vulnerability

Weaknesses or gaps in your protection efforts

Denial-of-service

When zombie computers saturate a server with unsolicited requests, and the flood of incoming requests forces the server to shut down.


Related study sets

complex: prioritization, delegation, NOF

View Set

PART 1 - Business Management Chapter 5

View Set

BOP week 4 ch. 37, 57 Jaclyns short set #1

View Set

Care Exam 5 Practice Questions (Final)

View Set