Ch16 Security Flashcards
Virus
Code that runs on a computer without the user’s knowledge; it infects the computer when code is accessed and executed.
Worm
Similiar to viruses except that it self-replicates.
Trojan Horse
Appears to perform legitimate function but are actually performing malicious functions behind the scenes.
Spyware
Malicious software either downloaded unwittingly from a website or installed along with some other third-party software.
Rootkit
Software designed to gain administrator-level control over a computer system without being detected.
Spam
The abuse of electronic messaging systems such as e-mail, broadcast media, and instant messaging.
Clearing
Removal of data with a certain amount of assurance that it cannot be reconstructed.
Purging
aka sanitizing; removal of data done in such a way that the data cannot be reconstructed. may use bit-level erasure software to completely destroy all data on the media.
What type of malware self-replicates
worm
What type of malware is the abuse of electronic messaging systems?
Spam
List three symptons of viruses?
- Computer runs slowly.
- Computer lock ups.
- Unusual error messages are displayed.
What is the science of recognizing humans based on physical characteristics?
biometrics
A hard drive needs to be disposed of in a way so taht no one can access the data.
Which method should you use?
Destruction
Which is the best mode to use when scanning for viruses?
safe mode.
What are five ways to prevent spyware?
- Adjust Internet Explorer security settings.
- Install antispyware software.
- Uninstall unnecessary applications and services.
- Educate users on how to surf the web safely.
- Consider technologies that discourage spyware.
One of your customers tells you that a bank employee called and asked for the person’s bank balance and telephone number.
What is this an example of?
Social Engineering
Turn on User Account Control in Win 7
Start >> Control Panel >> User Accounts and Family Safety >> User Accounts >> click Change User Account Control settings link.
Four levels of Win 7 UAC
- Always Notify
- Default: Notify Me Only When Programs Try to Make Chances to My Computer.
- Notify Me Only When Programs Try to Make Changes to My Computer (Do Not Dim My Desktop)
- Never Notify - Shuts off UAC
Where are NTFS permissions found?
Security Tab of the folder’s Properties Window.
Two Components Needed for BitLocker Encryption
- Trusted Platform Module - Chip on motherboard that stores encrypted keys or external USB key to store the encrypted keys.
- Hard drive with two volumes, preferably created during installation of Windows.
Why does BitLocker need two volumes on a hard drive?
One volume is needed for the operating system that will be encrypted, the other volume is the active volume that remains unencrypted so the computer can boot.
Name a common security component of Win7/Vista?
User Account Control (UAC)
A user complains that while away at lunch someone used his computer to send e-mails to other co-workers without his knowledge. What should you recommend?
Use the Windows Lock feature.
What best describes encryption?
Prevents unauthorized users from viewing or reading data.