chapter 11 - computer security Flashcards
Concerned with Risk Management, Confidentiality, Integrity, and the availability of electronic information that is processed and stored in a computing system.
computer security
the recognition, consequences, and assessment of risk to a computer system.
risk management
are people who attempt to invade or disable a computer’s security measures and steal their resources. Hackers also try to hijack computer processing cycles, speed, and storage space.
hackers
______ are extremely easy to breach, especially by a seasoned hacker. Some techniques include:
- Malicious attachments to emails
- Viruses
- Worms
- Malware
Unsecured computers
Businesses commonly take advantage of the Internet and sometimes setup ____
Intranets
The key aspect of an Intranet
privacy
is guarded by Firewalls, hardware (Proxy Server) and software that keep unauthorized users out.
intranet
files that reproduce by making copies of themselves within a computer’s memory, storage, or network.
computer viruses
are like viruses but do not need to attach itself to an existing files to spread.
worms
seem harmless and wait for a computer event to spread and unleash other malware.
trojan horses
a computer program installed covertly and secretly monitors a user’s keystrokes and behavior.
spyware
typically more irritating then malicious and usually installed covertly and automatically display or download advertising to a computer
adware
the abuse of an email system to arbitrarily send typically millions of unsolicited bulk messages.
spamming or junk ware
attempts to make a computer or any of its resources unavailable to its users.
Denial-of-service attack
when a user signs in to a computer work station where a malicious software covertly records keystrokes.
reverse phishing / key logging
attempts to identify, prevent, and eliminate computer viruses and malware. Examines computer files and matches them to known viruses stored in a database.
antivirus software
Two of the more popular antivirus software
Symantics Corporation’s Norton AntiVirus and McAfee’s VirusScan.
A broad term that refers to any fraudulent activity that occurs in an online setting.
internet fraud
the crime of assuming another’s identity for economic gain.
Identity Theft
a program that automatically clicks advertising networks ads, typically randomly, for profit.
Click Fraud
are simply when a unscrupulous merchant does not deliver goods or services already paid for online.
Purchase Scams
a legitimate looking, socially engineered email attempting to deceptively gain private information.
Phishing
can be defined as the ability of an individual to keep their personal information out of public view.
privacy
an expectation of remaining anonymous while using a computer system or network.
computer privacy
typically text files on a client computer that users are typically unaware of that keeps track of that user’s information.
tracking cookies
when experts extract useful information from recorded data, like a cookie.
data mining
a crime concerning the unlawful practice of assuming another individual’s identity.
identity theft
terms used to refer to all types of crimes in which someone wrongfully obtains and uses another person’s personal data for fraud and deception.
Identity Theft and Identity Fraud
when a criminal in a public place glances over their victim’s should to gain information like PIN numbers or passwords.
shoulder surfing
sorting through refuse to gain information that most likely should have been shredded.
dumpster diving