Chapter 11 Society, Security, Privacy Ethics Flashcards

1
Q

What is computer crime?

A

is any illegal act involving a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Script Kiddie

A

same intent as a hacker

does not have technical skills and knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cyberextortionist

A

someone who uses email as a vehicle for extortion, threatens to attack company if not paid a sum of money

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cracker

A

someone who accesses a computer or network illegally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cyberterrorist

A

uses computers to damage or destroy computers for political reasons

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is an online security service?

A

checks computer for vulnerabilities, and provides recomendations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are some forms of internet and network attacks?

A

Computer viruses, worms, torjan horses, botnets, denial of service attacks, back doors, spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a payload?

A

is the destructive event or prank the program is intended to deliver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a worm?

A

a program that copies itself repeatedly, in memory , uses up resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a rootkit?

A

a program that hides in a computer

allows someone in a remote location to take full control of the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are some symptoms of viruses, worms, trojans?

A
Unusual messages or images
music or random sounds
memory less than expected
files dissapear
files become corrupted
programs or files dont work properly
unknown programs appear
OS doesnt start
OS shuts down unexpectedly
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What 4 ways can a payload be delivered?

A
  1. Open an infected file
  2. Runs an infected file
  3. Boots the computer with an infected removable media in a port
  4. Connects an unprotected computer to a network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are some precautions against viruses etc?

A

Trusted sources
Virus hoax
Macros - Instructions in software to continually update against attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Virus Signature

A

is a known specific pattern of virus code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Inoculate

A

Antivirus records imformation about files, if a virus tampers with the file, the antivirus will detect descrepencies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Quarantine

A

is a separate part of hard disk, holds infected files until it can be removed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Botnet

A

a group of comprmised computers connected to a network, being used to attack other networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Zombie

A

is a compromised computer
owner is unaware
being used from a remote location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Bot

A

a program that performs a repetitive task on a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Denial of service attack

A

Dos attack
an assualt on a computer
purpose- to disrupt access to an internet service
Jams, blocks legitimate visitors from accessing network

21
Q

DDos Attack

A

Distributed dos attack, means thats a zombie army is used to attack multiple computer networks

22
Q

Back doors

A

a program or set of instructions that allow users to bypass security and access the network

23
Q

Spoofing

A

a technique to make internet transmission appear legitimate to a victim

24
Q

IP spoofing

A

when people use fake IP addresses to gain access

25
Q

What is a proxy server?

A

a server outside the computers network, controls which communicationspass into the companys network

26
Q

Intrusion detection software

A

combined with a firewall, adds another layer of protection

assesses system vulnerabilites

27
Q

Honeypot

A

a vulnerable computer that is setup to entice an intruder to break into it

28
Q

AUP

A

acceptable use policy, outlines what netowk may and may not be used for

29
Q

possessed object

A

any item you must carry to obtain access ti a computer or facility…..badge, card, smart card

30
Q

License agreement

A

the right to use the software
users to not own the software
provides specific conditions for use of the software

31
Q

Single user license agreement

A

EULA, included with software, uses can use on only one computer, make one copy as backup, give or sell if is first removed from computer.

32
Q

Plaintext VS ciphertext

A

plaintext is readable. ciphertect unreadable

33
Q

Encription key

A

programmed formula, recipient of data uses to decipher text

34
Q

hash

A

is a mathematical formula that generates a code from the contents of the message and differs for each message

35
Q

Transport layer security

A

successor of SSL secure socket layer
encripts data
web addresses with SSL have https instead of http

36
Q

Secure HTTP

A

allows users to choose an encryption scheme for data

more difficult to use than SSL but more secure

37
Q

VPN

A

Virtual private network

38
Q

Brownout

A

a prolonged undervoltage

39
Q

Surge protector

A
Smooths out noise
provides stable current flow
allows no more than 500 maximum volts to pass through line
protects equipment from spikes
one nansecond reaction time
should have a rating of at least 200
40
Q

UPS

A

uninterurupitble power supply

41
Q

Three generation backup

A

grandparent- oldest copy
parent - second oldest copy
child - most recent copy

42
Q

What are some safeguards for wireless security?

A

ensure equipment uses wirless standards

802.11i , wi-fi protected access, wires equivalent privacy

43
Q

CVS

A

computer vision syndrome

44
Q

Code of conduct

A

a written guideline that helps determine weather computer actions are ethical or not

45
Q

Spim

A

spam sent through an instant message

46
Q

split

A

is spam sent visa internet telephony

47
Q

Phishing

A

sends an official looking email that attempts to obtain your personal imformation

48
Q

Pharming

A

trhough spoofing attempts to obtain your personal details