chapter 11 - computer security Flashcards

1
Q

Concerned with Risk Management, Confidentiality, Integrity, and the availability of electronic information that is processed and stored in a computing system.

A

computer security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

the recognition, consequences, and assessment of risk to a computer system.

A

risk management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

are people who attempt to invade or disable a computer’s security measures and steal their resources. Hackers also try to hijack computer processing cycles, speed, and storage space.

A

hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

______ are extremely easy to breach, especially by a seasoned hacker. Some techniques include:

  • Malicious attachments to emails
  • Viruses
  • Worms
  • Malware
A

Unsecured computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Businesses commonly take advantage of the Internet and sometimes setup ____

A

Intranets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The key aspect of an Intranet

A

privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

is guarded by Firewalls, hardware (Proxy Server) and software that keep unauthorized users out.

A

intranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

files that reproduce by making copies of themselves within a computer’s memory, storage, or network.

A

computer viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

are like viruses but do not need to attach itself to an existing files to spread.

A

worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

seem harmless and wait for a computer event to spread and unleash other malware.

A

trojan horses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

a computer program installed covertly and secretly monitors a user’s keystrokes and behavior.

A

spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

typically more irritating then malicious and usually installed covertly and automatically display or download advertising to a computer

A

adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

the abuse of an email system to arbitrarily send typically millions of unsolicited bulk messages.

A

spamming or junk ware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

attempts to make a computer or any of its resources unavailable to its users.

A

Denial-of-service attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

when a user signs in to a computer work station where a malicious software covertly records keystrokes.

A

reverse phishing / key logging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

attempts to identify, prevent, and eliminate computer viruses and malware. Examines computer files and matches them to known viruses stored in a database.

A

antivirus software

17
Q

Two of the more popular antivirus software

A

Symantics Corporation’s Norton AntiVirus and McAfee’s VirusScan.

18
Q

A broad term that refers to any fraudulent activity that occurs in an online setting.

A

internet fraud

19
Q

the crime of assuming another’s identity for economic gain.

A

Identity Theft

20
Q

a program that automatically clicks advertising networks ads, typically randomly, for profit.

A

Click Fraud

21
Q

are simply when a unscrupulous merchant does not deliver goods or services already paid for online.

A

Purchase Scams

22
Q

a legitimate looking, socially engineered email attempting to deceptively gain private information.

23
Q

can be defined as the ability of an individual to keep their personal information out of public view.

24
Q

an expectation of remaining anonymous while using a computer system or network.

A

computer privacy

25
Q

typically text files on a client computer that users are typically unaware of that keeps track of that user’s information.

A

tracking cookies

26
Q

when experts extract useful information from recorded data, like a cookie.

A

data mining

27
Q

a crime concerning the unlawful practice of assuming another individual’s identity.

A

identity theft

28
Q

terms used to refer to all types of crimes in which someone wrongfully obtains and uses another person’s personal data for fraud and deception.

A

Identity Theft and Identity Fraud

29
Q

when a criminal in a public place glances over their victim’s should to gain information like PIN numbers or passwords.

A

shoulder surfing

30
Q

sorting through refuse to gain information that most likely should have been shredded.

A

dumpster diving