Intro to Computing

Ace your homework & exams now with Quizwiz!

what is DoS and DDoS Attacks

A DoS attack stands for Denial of Service. A DoS is an attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests.

what is a Computer Virus ?

A computer virus is software that infects computers and is created using computer code. Computer viruses typically must be "run" to attack and do damage. Viruses can destroy programs or alter the operations of a computer or network.

what is Cookie in computing ?

A cookie is a small text file of information created by websites you visit that your web browser stores on your hard disk

what is Cyberattack ?

A cyberattack is a deliberate misuse of computers and networks. Cyberattacks use malicious code to modify the normal operations of a computer or network, resulting in disruptions that can compromise data and lead to a variety cybercrimes.

what is Cyberterrorist ?

A cyberterrorist uses computers and the internet to launch attacks against computer systems for political or ideological reasons.

What is Worms?

A destructive program that replicates itself throughout a single computer or across a network. • •automatically reproduces itself • •designed to attack both wired and wireless networks • •replication exhausts network bandwidth or available storage

what is Firewall?

A firewall is hardware or software used to keep a computer secure from outside threats such as hackers and viruses. Firewalls allow or block Internet traffic in and out of a network or computer.

what is Hacker?

A hacker is a person who gains unauthorized access to networks in order to steal and corrupt information and data. The term hacker and cracker are synonymous. A hacker commonly attempts to steal and corrupt information and data. The term hacker and cracker are synonymous.

what is Keystroke logger?

A keystroke logger is a form of spyware that records all actions typed on a keyboard. more info about Keystroke •can be used on smartphones, tablets, and laptop computers •can be hardware devices and software applications •software based keystroke loggers are often a Trojan that is installed without the user's knowledge •keystroke loggers can record passwords and confidential information

A Macro virus ?

A macro virus is a virus that is written in a macro language and placed within a document or spreadsheet. When the document or spreadsheet that has been infected by a virus is opened and the macro is executed, commands in the macro language set off the destructive events that the virus was designed for.

what is passwords security ?

A password is a secret code used to help prevent unauthorized access to data and user accounts. Passwords only identify the authenticity of the password, not the user.

what is a Password?

A password is a secret code used to help prevent unauthorized access to data and user accounts. Passwords only identify the authenticity of the password, not the user.

what is Trojan ?

A program that appears legitimate, but executes an unwanted activity when activated. Often used to find passwords, destroy data, or to bypass firewalls. Similar to viruses, but do not replicate themselves. Often found attached to free downloads and apps and disrupt computer performance.

What is a Rootkit ?

A rootkit is a type of malware that hides in the system and is triggered each time you boot your computer. rootkit used for •install rogue files •use and take control of the computer by creating a "backdoor" bypassing security •delete files

what is a Spam Filter?

A spam filter is computer software that is designed to prevent spam messages from entering a user's email inbox. Spam filters are also known as spam blockers or anti-spam utilities. Spam filters search for spam by watching for keywords and by monitoring suspicious word patterns and frequencies.

what is Cyberbullying ?

Cyberbullying is harming or harassing a person or group of people via information technology and networks in a repeated deliberate manner.

what is Cyberbullying?

Cyberbullying is harming or harassing a person or group of people via information technology and networks in a repeated deliberate manner. • Cyberbullies use Internet service and mobile technologies such as web pages and discussion groups as well as instant messaging and text messaging with the intention of harming another person.

what is Cybercrimes?

Cybercrime is criminal activity committed with a computer. • Cyber criminals use computer technology to access personal information, trade secrets or for malicious purposes.

what is Cybercrime?

Cybercrime is criminal activity committed with a computer. • Cyber criminals use computer technology to access personal information, trade secrets or for malicious purposes. Cybercrime, as a criminal moneymaker, has surpassed illegal drug trafficking.

How a Computer Virus Works

First, the virus arrives via email attachment, file download, or by "clicking" in an infected website. An action such as running or opening an infected file triggers the virus. The virus copies itself into files and spreads to other computer/devices or networks. The activated virus starts its destructive actions and result in a full-blown virus attack.

what is Malware?

Malware is short for malicious software. Malware is designed to steal information, destroy data, impact the operations of a computer or network, or frustrate the user. Malware includes a variety of programs including viruses, worms, and Trojan horses.

Ransomware

Malware that makes a computer's data inaccessible until a ransom is paid. •usually invades a computer by a Trojan in an legitimate-looking e-mail; or with a worm •typically encrypts the victim's data files and a message offers to decrypt the files for a ransom •payment which is usually made with bitcoin or prepaid card •There is no guarantee that a decrypting code will then be provided

What is Managing Cookies?

Managing cookies is important for safe and efficient web browsing. Cookies can be managed by determining which cookie settings should be considered. Cookie settings in web browsers: •delete cookies •block/customize cookies •Allow cookies

what is the Factors that Damage Computer Hardware?

Most damage occurs by devices being dropped or from spills. Power surges can destroy electronics-use a surge protector Heat can severely damage a digital device-ensure proper air circulation Humidity can negatively impact performance Magnetic fields and influence the flow of electricity

what can NAT do?

NAT can be used to prevent many types of network attacks, but in order to maximize security it must be used in conjunction with the firewall built into the router or the firewall provided by the OS.

what is NAT (Network Address Translation)

Network Address Translation (NAT) was developed by Cisco and is used by firewalls, routers, and computers that are part of a network and are connected to the Internet. NAT provides a type of firewall protection by hiding internal IP addresses.

What is pharming?

Pharming is a type of phishing that seeks to obtain personal information through malicious software that is deposited on a victim's computer. •the malicious software redirects the user to a phony web page, even when the correct web address is used •when the user has reached the fake webpage they are prompted to enter their username, password, and other sensitive personal information

How does a Virus Infect a Computer?

Viruses can affect a digital device in a number of ways including: •opening an infected Email attachment •downloading an infected file from the Internet •sharing infected files •visiting a contaminated Web site •by not running or maintaining your antivirus program

A Zombie is ?

A zombie is a computer that has been secretly taken over by an outsider typically using a rootkit. A group of compromised computers controlled by a hacker is called a botnet or a zombie army. Zombies are used to transmit spam messages from many different IP addresses.

what is Adware?

Adware is software that collects the user's web browsing history. Adware tracks the types of websites you visit and provides customized ads based on your browsing behavior.

What is Internet filter?

An Internet filter is firewall software used to block access to specific Internet content. Filters can be used by organizations, parents, and businesses to restrict access to file transfers, web sites, or Internet downloads.

what is Privacy risks with cookies?

Cookies pose many potential privacy risks. Websites that use cookies can collect information about surfing habits and sell that information to a variety of third-parties. cookie can be used to track your surfing behavior

what is cyberbullies use ?

Cyberbullies use Internet service and mobile technologies such as web pages and discussion groups as well as instant messaging and text messaging with the intention of harming another person.

what is Phishing?

Phishing is the illegitimate use of an email message that appears to be from an established organization such as a bank, financial institution, or insurance company.

what is Diagnosing a Hacked System?

Some signs of a system or device having been hacked •fake antivirus message; power down and reboot computer in safe mode and then run antivirus program •unwanted toolbars and frequent random pop-ups •fake e-mails or social media messages from your account •smartphones and tablets can be hacked; be sure to protect all devices

What is Spam?

Spam is an unsolicited e-mail message. •spam messages are sometimes called UBE, (unsolicited bulk email), and are used for a variety of marketing purposes including selling products and services •messages may contain a variety of malicious programs •it is estimates that 50% of the 293.6 billion e-mails sent everyday are considered spam

What is Packet Sniffers?

Specialized hardware or software that capture packets transmitted over a network. Also referred to as packet analyzers. Legitimate sniffers are used for routine examination and problem detection. Unauthorized sniffers are used to steal information. Packet sniffers can be very difficult to detect.

What is Spyware?

Spyware is software that collects information about your Internet surfing habits and behaviors. Includes the collection of keystrokes, passwords, and other confidential information. Often installed via free downloads or by visiting certain illegitimate websites.

what are the options to Manage a password ?

The best way to keep your Internet logins safe is to use a strong password and to never use the same password twice. A typical password manager is installed as a browser plug-in to handle password seizure and repeat.

what is Email virus?

Three common types of e-mail viruses: •Phishing - tricks users into revealing usernames and passwords by appearing legitimate • •Ransomware - when activated, encrypts files on user hard drive and then sells a decryption program • •Keystroke logging Trojan - when activated, saves all keystrokes for subsequent transmission to virus creator


Related study sets

MediaLab Hematology Practice Questions Part 1

View Set

Exam #1 (Chp 1-4) - Business Analytics II

View Set

TestOut Server 2016 Chapter 7 (7.1.4, 7.2.8, 7.3.5, 7.4.6, 7.5.9, 7.6.5, 7.7.6, 7.8.8, 7.9.5, 7.10.4)

View Set

Hematologic and Select Immunological Disorders

View Set

Life and Health Insurance Exam (3~

View Set

management of patient with oncological disorders

View Set

ACC 4110 Chapter 6: Internal Control in a Financial Statement Audit

View Set