Chapter 11 Computer Security And Risks Flashcards

1
Q

What is meant by computer security?

A

The protection of computing systems and data from unauthorized access, change & destructions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the different types of computer crime?

A

1) Cybercrime: Any crime using computers or networks

2) Cyberstalking: repeatedly harm or harass people on the internet

3) Cyber bullying: targeting children and young adults online involving humiliation, rumors, lies, or threats

4) Intellectual property theft: (software piracy, file sharing of copyrighted songs, illegal duplication, plagiarism)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is meant by spoofing?

A

Trick that target to extract secret information
E.g. Making a phone call and posing as an internet technician, to extract sensitive data (passwords)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is meant by shoulder surfing?

A

Is a type of social engineering technique used to obtain information by looking over the victim’s shoulder.
E.g. Passwords and other confidential data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is meant by phishing?

A

Is the act of attempting to acquire sensitive information by masquerading as a trust worthy entity in an electronic communication, Sending an email posing as a bank representative and asking to fill a fake bank web form.

Adults sites asking users to reveal credit card numbers to prove age

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is meant by identity theft?

A

The extraction of personal information to commit a crime in another persons identity

You can protect yourself by:

  • Use separate credit card for online use
  • Use secure websites (https://)
  • Don’t disclose personal info on phone
  • Handle email with care
  • Copy your cards to get replacement in case stolen
  • Report Identity theft promptly
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a software sabotage?

A

Malicious software:

Malware used to disrupt computer operation, gather sensitive information, or gain access to private computer systems via:

1) Viruses
2) Worms
3) Trojan horses
4) Spyware
5) Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a virus?

A

Malware that are attached to a file/program and spread when files are exchanged via email attachments or flash drives, When the program is opened/executed it:

1) Damages the Operating system
2) Destroys or steals data
3) Display annoying pop-up messages

  • It maybe OS specific but newer types are cross-platform.
    Macro viruses: attach themselves to documents containing macros, which are a set of commands to automate repetitive tasks, like MS Office files, Melissa virus (1999)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is meant by worms?

A
  • Independent programs
  • Capable of reproducing themselves
  • Causes memory freeze
  • Spreads through the internet

Famous example is the code Red (2001) which attacked the internet running Microsoft servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is meant by Trojan horse?

A

Disguise themselves as useful programs or apps, but has hidden destructive program (viruses)

  • Often posted in shareware
  • Names sound like games or utilities
  • Act as a backdoor allowing the attacker to control your PC to delete/change/share data
    E.g. time bomb – triggered by a date or time-related event
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is meant by ransomware?

A

Malware that locks your computer and encrypts data in your hard drive, Demanding you to pay a ransom to unblock the files again getting hacked often by opening an infected email attachment or malicious link

Attackers usually ask you to pay the ransom using digital currencies, such as Bitcoin because it is untraceable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Who are the hackers? And what are the types of hackers?

A

Hackers are people who break into computer systems or networks, controlling computers or steal personal information to commit identity theft, type of hackers are:

1) Black-Hat hackers

Criminals develop new techniques to penetrate systems to gain illegal access or destroy information

2) White-Hat hackers

Security experts developing new techniques to protect us.
For non-malicious reasons such as to expose/test the system weaknesses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a zombie computers?

A

Internet connected computers that have been hijacked using viruses to perform malicious acts without the knowledge of the owners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is meant by botnets?

A

Group of software programs called bots that Run automatically on zombie computers to perform malicious acts without knowledge of the owners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is meant by distributed denial of service (DDoS)?

A
  • Bombards servers and web sites with traffic that shuts them down, using thousands of zombie computers (botnets)
  • Authorized users cannot use their computer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is meant by security biometrics?

A

The identification of human by their unique traits, signature, voice print, finger print, retinal scan

17
Q

What is a password?

A

Most common tool used to restrict access to computers

Effective Passwords:
- Not real words
- Changed frequently

Rules for creating a password:
- More than 8 characters
- don’t use a guessable password

18
Q

What is meant by access privileges?

A

A access control software:

  • Doesn’t need to teat all users identically
  • One of the accounts must be a admin (permits to install additional software, changes system settings)
19
Q

What is meant by a firewall?

A
  • Protects us from hackers
  • filters information between a private systems and the rest of the internet

It can be:
- software program
-Hardware device
- or both

20
Q

What is meant by encryption?

A

The scrambling of transmitted messages to secure them using a secret code Calle a key

Decryption is the reverse process to retrieve the original data

21
Q

What is meant by Left-Shift & Right-Shift encryption?

A

Left key: replaces every letter with the 5th letter before it
Right key: replaces every letter with the 5th key after it

22
Q

How to protect and prevent yourself from being hacked?

A

Via Anti-Virus softwares:

  • Protects the computer from harm
  • Detects viruses and deletes them
  • Monitors the system
23
Q

What is meant by a audit control software?

A

Monitoring an e-card in users computer transactions, to trace and identify suspicious computer activity

24
Q

What are the different precautions you can do to be safe?

A

1) Uninterrupted power supply (UPS), protects data loss due to power failure

2) surge protector, shields electronic equipments from dangerous power spikes

25
Q

What is a backup and its forms?

A
  • Used to replace originals
  • Best data recovery insurance is Regular Backups

Backup storage:
- Online in the cloud – remote storage
- Off-site – hard drives or flash drives stored in remote locations
- Backup drive in laptops, external hard drives, network storage

Types of backups:
Incremental: only new files or modified files, Happens more or less continuously e.g. Hourly, Daily
Bootable: Entire system backup Makes a complete duplicate of a disk in case of a crashe.g. Weekly or after installing new software

26
Q

How can you preform safe computing?

A
  • If it’s important, back it up
  • If it’s sensitive, lock it up
  • If you’re sending sensitive information, consider encryption
  • Beware of email bearing gifts
  • Share with care
  • Handle shareware and freeware with care
  • Don’t pirate software
  • Disinfect regularly
  • Take your passwords seriously
27
Q

Security VS privacy

A

Security measures prevent crime but they can also threaten privacy like:

Smart badges:
- Broadcast identification codes
A badge-location database stores data about the location of the badge (or person)
Instead of paging the entire hospital, an operator could route the call.
- Smart phones have proximity recognition technology

28
Q

Examples of Computers at war

A

1) Smart weapons
2) autonomous systems
3) cyber warfare (By attacking computer networks the enemy can damage Telecommunications, Power grids, Water and gas supplies)