Chapter 5 Computer Security and Privacy Flashcards
What is hardware theft?
The theft of computer hardware
What is Hardware loss?
When a personal computer, USB flash drive, mobile device, or other pice of hardware is stolen or is lost by owner
What is System failure?
The complete malfunction of a computer system
What are some ways to proven against Hardware loss?
- secure computers with cable locks and cable anchors
- secure with laptop alarm software if the unit is unplugged it emits a very loud alarm or us USB devices are removed or if computer is shutdown
What are some ways to prevent information from being accessed from hard drives if the computer is stolen or broken into?
- Full disk encryption
self encrypting hard drives
What is full disk encryption (FDE)?
A technology that encrypts everything on a storage medium, with out any user interaction
What is a self encrypting hard drive?
A hard drive that uses full disk encryption.
What is stealth tracking software used for?
A software program that runs on the computer that tracks the computers whereabouts…this can run without the thief know that it is present.
What is a kill switch
A technology software that causes the computer to “self-destruct” if it it stolen.
What are asset tags and how do they work?
These are permanently attached to hardware and other expensive assets. The labels usually identify the owner.
Some tags are indestructible and others have labels on the surface but etching underneath the label which is exposed when the label is removed
What are some additional software precautions that are for mobile users?
- Mobile device management software (MDM software)
- Mobile tracking software
- Wireless tether system
How does Mobile device management software work?
Controls what apps can be installed or disables the camera etc if cameras are not allowed
How does mobile tracking software work?
Software that remotely locks down or wipes a device if it is stolen.
How does a wireless tether work?
This ties your phone to a key fob in order to sound and alarm if you go further than the allowable distance.
What are some general mobile computing precautions for the end user?
- install and use encryption, antivirus etc.
- secure computers with boot passwords,
- set your mobile phone etc to auto lock after a short period and require a password to unlock
- use only secure Wi-Fi connections and disable Wi-Fi and bluetooth when they are not in use
- never leave usernames, passwords oath other data attached to your computer or inside its carrying case
- use a plain carrying case to make it less conspicuous
- kepp and ey on your devices esp when going through airport security systems
- avoid setting devices on floor or leaving them in your hotel room; use cable lock to secure the dive to a desk when it is unavoidable
- back up the data stored on the device regularly
- consider installing tracking or kill switch software
What is a ruggedized device?
A device such as a portable computer or mobile phone that is designed to withstand much more physical abuse than its conventional counterpart
What is a surge suppressor?
A device that protects a computer system from damage due to electrical fluctuations
What is an uninterruptible power supply? (UPS)
A device containing a built-in battery that provides continuous power to a computer and the other connected components should the electricity goes out.
What is Software piracy?
the unauthorized copying of a computer program
What is digital counterfeiting?
The use of computers or other types of digital equipment to make illegal copies of currency, cheques, collectibles, and other items
What does EULA mean
End user license agreement
computer retailers installing unlicensed copies of software on computers sold to consumers and large scale operations in which the software and packaging are illegally duplicated and then sold as supposedly legitimate products
What is a product registration code or product key?
An antipiracy tool that requires a unique activation code before the software can be installed
What is SIIA?
Software and Information Industry Association
A trade association that helps fight against piracy.
What does V.i Labs CodeArmor Intelligence software do?
It is designed to detect and report products that have been tampered with such as products whose licensing feature has been disabled then resold
What are some steps that the USTreasury dept use to prevent counterfeiting of U.S. Currency?
- Release new currency designs every 7 to 10 years
- New designs contain such features as microprinting, watermarks, and security threads
- They also have colours and watermarks
What are some prevention techniques for other types of documents such as cheques and ID cards?
Watermarks
RFID tags