Chapter 5 Notes Pt. 1 Flashcards
a group of compromised computers or mobile devices connected to a network
botnet
A botnet composed computer or device is known as a ________
zombie
_______ ___ _______ _______ (____ _______) disrupts computer access to Internet services
denial of service attack (DoS attack)
a program or set of instructions in a program that allow users to bypass security controls
back door
a technique intrudes use to make their network or Internet transmission appear legitimate
spoofing
hardware and/or software that protects a network resources form intrusion
firewall
What is the difference between unauthorized access and unauthorized use?
unauthorized access- the use of a computer or network without permission
unauthorized use- the use of a computer or its data for unapproved or possibly illegal activities
To protect files on your local hard disk from hackers and other intrudersm turn off ___ and _______ _______ on your Internet connection
file
printer
sharing
a security measure that defines who can access a computer, device, or network
access control
Access control defines:
(1) who can access a computer
(2) when they can access it
(3) what actions can be taken while accessing it
a unique combination of characters that identifies one specific user
user name
a private combination of characters associated with the user name that allows access to certain computer resources
password
A ___________ ________ is any item that you can, to gain access to a computer or computer facility
posessed object
A posessed object can often be used in combination with a ____ (_________ ____________ _________)
PIN (personal identification number)
authenticates a person’s identity by translating a personal characteristics into a digital code that is compared with a digital code in a computer
biometric device
the discovery, collection, and analysis of evidence found on computers and networks
digital forensics
Software theft occurs when resources:
(1) steals software media
(2) inetionally erases programs
(3) illegally registers and/or activites a program
(4) illegally copies a program
A single-user license agreement typically contains the followign conditions:
You can:
(1) install the software on only one computer
(2) make one copy of the software as a backup
(3) give or sell the software to another individual, but only if the software is removed from the user’s computer first
A single-user license agreement typically contains the followign conditions:
You cannot:
(1) install the software on a network’s software
(2) export the software
(3) rent or lease the software
(4) give copies to friends and colleagues, while continuing software
What are the common types of malware?
(1) virus
(2) worm
(3) trojan horse
(4) rootkit
(5) spyware
(6) adware
Which type of malware is this:
a potentially damaging program that affects, or infects, a computer or mobile device negatively by altering the way the computer or device works without the user’s knowledge or permission
virus
Which type of malware is this:
a program that copies itself repeatedly, using up resources and possibly shurring down the computer, device, or network
worm
Which type of malware is this:
a program that hides within or looks like a legitimate program.
trojan horse
Which type of malware is this:
a program that hides in a computer or mobile device and allows someone from a remote location to take full control of the computer or device
rootkit
Which type of malware is this:
a program placed on a computer or mobile device without the user’s knowledge that secretly collects information about the user and then communicates the information it collects to some outside source whiel the user is online
spyware
Which type of malware is this:
a program that displays an online advertisement in a banner or pop-up window on webpages, email messages, or other Internet services
adware
True or False: A trojan horse can replicate itself
False; unlike a virus or worm, a trojan horse does not replicate itself to other computers or devices
occurs when someone steals personal or confidential information
information theft
a process of converting data that is readable by humans into encoded characters to prevent unauthorized access
encryption
a notice that guarantees a user or a website is legitimate
digital certificate
a website that uses encryption techniques to secure its data is known as a _______ _____
secure site
What is the difference of hardware theft and hardware vandalism?
Hardware theft- the act of stealing digital equipment
Hardware vandalism- the act of defacing or destroying digital equipment
To help reduce the chance of theft, companies and schools use a variety of ________ __________
security measures
List hardware theft and vandalism safeguards.
(1) physical access controls
(2) alarm system
(3) physical security devices
(4) device-tracking app
List hardware failured safeguards.
(1) surge protector
(2) uninterruptible power supply (UPS)
(3) duplicate components or duplicate computers
(4) fault-tolerant computer