Ch 10 Flashcards
a serious form of personal cybercrime with the perpetrator demonstrating a pattern of harassment and posing a credible threat of harm is
cyberstalking
what redirects you to a phony website even if you type the correct address into your browser
pharming
what occurs when someone fraudulently uses your name, SSN, or bank or credit card number
identity theft
what is an unlawful attack against computers or networks thats done to intimidate a government or its people for a political or social agenda
cyberterriorism
what occurs when sensitive data is stolen or viewed by someone who is not authorized to do so
a data breach
a ____ is a form of malware that changes your home page and redirects you to other websites
browser hijacker
a ____ sends out so much traffic that it could cripple a server or network
denial of service attack
the ____ is encrypted and hidden and only accessible using the TOR browser to view it anonymously and securely
deep web
what is a security feature of a router that shields the devices on a private network from the public network (the Internet)
network address translation
what makes it a crime to access classified info
comp fraud and abuse act of 1986
where can you file a cyber crime report
internet crime complaint center
what forces users to practice safe computing and prevent a lot of potential problems from affecting the system
acceptable user policy AUP
what is an attack that occurs on the day an exploit is discovered before the publisher of the compromised software can fix it
zero day exploit
what is a large planned update that addresses multiple problems or adds multiple features
service pack
what addresses individual problem as they are discovered
patch/hotfix
what converts unencrypted, plain text, into code called cipertext
encryption
what will notify you before changes are made to your comp
user account control UAC
what uses a push button, PIN< or USB key to auto configure devices to connect to your network
wifi protected setup WPS
what adds security to a wireless network by encrypting transmitted data
wireless encryption
what is the wireless network name
SSID
what is a device that connects 2 or more networks together
router
what acts like a firewall by preventing unauthorized access to your network
router
what are packages of security software that include a combination of features such as antivirus, firewall, and privacy protection
security suites
what is an advantage of security suites
complete protection
what is an disadvantage of security suites
expenisve and may use a lot of system resources
what prevents adware and spy ware software from installing itself on your comp and can be used to clean an infected macine
antispyware software
what provides protection against more than just viruses but also protects against Trojans, worms, and spyware
antivirus programs
software firewall also blocks access to
an individual machine
what is a hardware device that blocks unauthorized access to your network
firewall
what happens when you visit a web site that installs a program in he background without your knowledge
drive by download
what is an anonymous digital currency
bitcoin
what prevents you from using your comp until you pay a fine or fee
ransomware
what is a set of programs that enables someone to gain control over a comp system while hiding the fact the the comp has been compromised
root kit
what is a program that appears to be a legitimate program but is instead something maliciou
trojan horse
what is an attack perpetrated by sending out so much traffic that it cripples a server or network
denial of service attack
what is a network of infected comp zombies or bots that are compelled by a master
botnet
what’s is self replication but it doesnt need a host to travel virtually
worm
what behaves like a virus but it doesn’t spread to the other machines
logic bomb
when a logic bomb has a specific trigger date it is called a
time bomb
what attack may corrupt of delete files or it may erase an entire disk
payload attack
what is a program that replicates itself and infects comps
virus
a browser hijacker can changes you home
page and redirects you to other websites
spyware secretly
gathers personal info about you
adware shows you
ads
what are small text files that websites use to identify you when you return
cookies
what is malicious software
malware
what items can only be purchased using cryptocurrency
items from the darknet markets
what is a subset of the deep web
dark web
what browser do you need to use to access the darkweb
TOR
what systems that require you to pay for access to content
paywalls
how much of the web that is the deep web is unindexed
96%
what percentage of the clear web is indexed
4%
what is an unlawful attack on comps or networks done to intimidate a govt or its people for a political or social agenda
cyberterrorism
what occurs when sensitive data is stolen or viewed by someone who is not authorized to do so
data breach
what is hacking to make a political statement
hactktivism
who hack into systems illegally but not with malicious intent
gray hat hackers
who hacks into systems for malicious purposes
black hat hackers
what are security experts that are paid to hack systems
sneakers
white hat hackers
white hat hackers are motivated to find
security holes in a system to prevent future hacking
what are programs or devices that capture what is typed on a keyboard
keyloggers
when someone fraudulently uses your name, SSN, or bank or credit card numbers is called
identity theft
fake bidding by the seller or an accomplice to drive up the price of an auction item is called
shill bidding
when users share posts without clicking them first which can foal you into believing the links are safe is called
share bidding
what is a link that teases you with just enough info to get you to click the link, driving traffic to a webpage
click bait
when clicking on a link allows malware to post unwanted links on your page is called
click jacking
when someone convices a victim to voluntarily and knowingly give money or property to another person is called
comp fraud
what redirects you to a phony website by hijacking the domain name of a company or poisoning the DNS server references to a site
pharming
what uses email messages or IMs that appear to be from those you do business with
phising
when a stalker demonstrates a pattern for harassment that poses a credible threat or harm online is called
cyberstalking
exchanges between adults that are malicious in intent is called
cyber harrassment
exchanges of malicious intent between minors is called
cyber bullyin
cybercrime refers to
criminal activity on the internet
personal cybercrime is against
individuals not businesses