Chapter 11 Flashcards

1
Q

FBI Wanted List for cyber Criminals

A
  • had over 100 people on it
  • each responsible for consumer loss ranging from $35000 to 100 million
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Computer security is concerned with:

A
  1. risk management
  2. privacy (want to make sure all data is kept private)
  3. Integrity
  4. availability
    of e information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Risk management

A

recognition, consequences, and assessment of risk to a computers assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What percentage of employees steal data?

A

57%

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How often does identity theft happen?

A

every 2 seconds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

whats a hacker

A

someone who attempts to invade or disable a computer’s security measures and then to steal the computer resources at their leisure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

unsecured computer

A

extremely easy to breach, especially by a seasoned hacker. Many times these computers are connected to the Internet, so they receive emails with malicious attachments like viruses, worms, and malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the average time to identify a computer breach?

A

207 days for a company to identify

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

how many reports of identity theft did FTC receive

A

11 million

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What percentage of Americans have never checked to see if their data was breached?

A

64%

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What percentage of funds that are stolen are not recoverable?

A

68%

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Most common type of threats

A

-most common is use of stolen cards then followed by ransomware and phishing

  • average smart home could be at risk of more than 12,000 hacker attacks in 1 week
  • 43% of all breaches are insider threats either intentional or unintentional
  • over 24 billion passwords were exposed by hackers in 2022 and 64% pf passwords only contain 8-11 letters
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Hacker facts

A
  • only need internet and a computer
  • events held called hackathons
  • not all hackers are paid
  • look to steal information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

3 things hackers look for

A
  1. information
  2. places to store information other than their own computer
  3. processing power
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

types of hackers

A
  • white hat hackers
  • black hat hackers
  • script kitties
  • Cracker
  • hactivist
  • cyberterrorist
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How do you keep hackers out

A
  1. firewall
  2. virus utilities
  3. strong passwords
17
Q

firewalls

A
  • kept unauthorized users out
    -specialized hardware and software working together that ensures that only authorized personnel and employees within a business can use its Intranet.
18
Q

proxy server

A

communications in or out of an intranet pass through a special security computer

19
Q

“default-deny”

A

firewall rule set in that the only network connections that are permitted are the ones that have been explicitly allowed

20
Q

“default-allow”

A

rule set in that all traffic is allowed unless it has been specifically blocked

21
Q

Worms

A
  • self replicating
    -send copies of themselves to other parts of the network without user knowing
22
Q

Trojan horses

A

-seems harmless and possibly interesting at first until it is executed.

-

23
Q

Denial-of-service attack (DOS)

A

attacks target entire networks making them unavailable to users
causes:
-loss of revenue
- have to get an IT team costs money
- spending and wasting valuable time trying to fix it
- lose customer trust

24
Q

What should a workplace policy consist of?

A
  • best practices
  • code of conduct
  • mobile phone usage
  • smoking, drugs, alcohol, vaping
  • track employees (error rate, arrival times, break times, etc)
  • transactions process
  • website visiting and surfing
25
Q

what should an internet policy consist of?

A
  • business monitors computers to see what youre looking up
  • monitor what you access on your computers
26
Q

what should privacy policy consist of?

A
  • most companies ask for pin numbers to verify its the correct person
27
Q

reverse phishing/keylogging

A

keylogging is when perpetrators log into your computer and get access to it from anywhere
reverse phishing is they come to your computer and install a program

28
Q

what is internet fraud

A

any type of fraud that is over the world wide web, takes place through emails, websites, etc.

29
Q

click fraud

A

deals with advertising, tries to manipulate the system to get paid from click ads of others

30
Q

purchase scam

A

a buyer (typically from another country) asks to purchase something with a credit card once items are shipped the credit card is cancelled

31
Q

dumpster diving

A

diving into a dumpster to look for your information

32
Q

data diving

A

websites like amazon, netflix, yahoo, etc collect your data to try and understand it and evaluate it to suggest more things similar to what you normally buy or watch

33
Q

how to protect yourself

A

“SCAM”
- Stingy with information
- Check your financial records
- Ask for credit reports
- Maintain careful records

34
Q

shoulder surfing

A

a criminal in a public place can simply glance over victims shoulder and get their phone number, password on laptop, credit card #, etc.