ITEC 1001- Security

Ace your homework & exams now with Quizwiz!

On-going cybercrime events

Blackmail, cyberstalking

An internet filter can be installed on which of the following?

Computer, router, server

Signed into law by President Clinton in 1998, the - Millennium Copyright Act implements two World Intellectual Property Organization (WIPO) treaties.

Digital

Web cookie

Small text file of information created by websites you visit that your web browser stores on your hard disk

A deliberate misuse of computers and networks, - use malicious code to modify the normal operations of a computer or network.

cyberattacks

A type of malware that is triggered each time you boot your computer is called a

root kit

Software programs that hide in the operating system and allow for the installation of hidden files are called

root kits

Stored in temporary memory, - cookies are used to analyze and measure traffic on a web page

session

Computer experts that attempt to hack into a network to ensure that it is protected against intrusions are called - - hackers

white hat

The technology that provides a type of firewall protection by hiding internal IP addresses is called

NAT

Keystroke-logging Trojan

When activated, saves all keystrokes for subsequent transmission to virus creator

An attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a _____ attack.

DoS

Common symptoms of a computer virus

Documents will not save, programs launch on their own

Firewalls

Help protect against worms and hackers

Packet sniffers

Legitimate ones are used for routine examination and problem detection, unauthorized ones are used to steal information

Single event cybercrimes

Phishing, Trojan horse, keystroke logger

Symptoms of online nuisances

Pop ups start appearing after visiting unfamiliar sites, receiving a lot of bounced back emails and spam, frequent pop ups while searching the web or working in programs

Passports issued by the US and many other countries include - chips

RFID

Third party cookie

Small text file of information created by a website other than the one you are currently visiting and are used to track your surfing habits and are considered an invasion of privacy

First-party cookie

Small text file of information created by a website that you visit that keep track of your personal preferences and the current web browsing session

Other computer term

Software and hardware theft, first party cookies

The main governmental organization that oversees internet privacy in the United States is the Federal - Commission

Trade

Phishing

Tricks users into revealing usernames and passwords by appearing legitimate

A program that appears legitimate, but executes unwanted activity when activated is called a

Trojan horse virus

Online nuisances

Trolling, phishing, spyware, spoofing, and spam

Ransomware

When activated, encrypts files on user hard drive and then sells a decryption program

Virus symptoms

You cannot boot your computer, it is running slower than usual

Software that collects a user's web browsing history to create unsolicited targeted pop-up advertisements is called -.

adware

A person who gains unauthorized access to networks in order to steal and corrupt information and data is called a -.

hacker

The right of personal privacy concerning the storing, distributing, and displaying information concerning oneself via the internet is called

internet privacy

A virus written in macro language and placed within a document or spreadsheet is called a

macro virus

Experts suggest using password - software to keep your passwords safe.

management

Stored on a user's hard drive, a type of cookie that collects information about user preferences, password and username information, IP address, and data on web surfing behavior is referred to as a - cookie

persistent

A type of phishing that seeks to obtain personal information through malicious software that is inserted on a victim's computer and directs them to a fake webpage is called _______ .

pharming

What type of server intercepts all messages between client and server to help avert a hacker or other intruder from attacking a network?

proxy

Once the virus is identified the antivirus software attempts to remove the virus from the file. If the software cannot remove the infected file it will send the file to an isolated area on the hard disk called _____.

quarantine

Worms automatically

reproduce themselves

Typically computer viruses must be - in order to attack and do dama

run

The software code of a particular computer virus is called the virus -.

signature

Software that collects information about your internet surfing habits and behaviors is called -.

spyware

Your computer has been attacked and overtaken by a hacker. The hacker has control over your computer and can now use it to launch attacks on other computers and systems. Your computer is now known as a -.

zombie

Developed by Cisco and used by firewalls, routers and computers that are part of a network and connected to the internet, Network - Translation provides a type of firewall protection by hiding internal IP addresses

Address

Which of the following can prevent a virus infection?

Adjust your web browser's security settings to only allow browsing on trusted sites; never bypass your browser's built-in security features

Keystroke logger facts

Can be hardware devices and software applications, can be used to monitor employees, often Trojans installed without the user's knowledge, can record passwords and other confidential knowledge

What two organizations should you report a phishing virus to?

US-CERT, the institution the message was allegedly from


Related study sets

Greenhouse Effect and Climate Change

View Set

Chapter 16 Manifest Destiny and Its Legacy 1841-1848

View Set

Chapter 2: International Law and the World's Legal Systems

View Set