Chapter 9 - Protecting your System Flashcards

1
Q

Adware

A

A program that downloads on your computer when a user installs a freeware program, game or utility
- generally enables sponsored advertisements to appear in a section of a browser window or as a pop-up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Antivirus software

A

Software specifically designed to detect viruses and protect a computer and files from harm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Backdoor program

A

A program that enables a hacker to take complete control of a computer without the legitimate user’s knowledge or permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Backup

A

A copy of a computer file that can be used to replace the original if it is lost or damaged

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Biometric authentication device

A

A device that uses some unique characteristic of human biology to identify authorized users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Black-hat hacker

A

A hacker who uses his or her knowledge to destroy information or for illegal gain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Boot-sector virus

A

A virus that replicates itself into the master boot record of a flash drive or hard drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Botnet

A

A large group of software applications that run without user intervention on a large number of computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Computer forensics

A

The application of computer system and techniques to gather potential legal evidence
- law enforcement specially used to fight high-tech crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cookie

A

A small text file that some websites automatically store on a client computer’s hard drive when a user visits the site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cyberloafing

A

Doing anything with a computer that is unrelated to a job while one is supposed to be working (aka cyberslacking)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Data breach

A

When sensitive or confidential information is copied, transmitted or viewed by an individual who is not authorized to handle the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Data file

A

A file that contains stored data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Denial-of-service (DoS) attack

A

An attack that occurs when legitimate users are denied access to a computer system because a hacker is repeatedly making requests of that computer system that tie up its resources and deny legitimate users access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Distributed denial-of-service (DDoS) attack

A

An automated attack that is launched from more than one zombie computer at the same time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Drive-by download

A

The use of malicious software to attack a computer by downloading harmful programs onto a computer, without the user’s knowledge, while they are surfing a website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

E-mail virus

A

A virus transmitted by email that often uses the address book in the victim’s email system to distribute itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Encryption virus

A

A malicious program that searches for common data files and compresses them into a file using a complex encryption key, thereby rendering the files unusable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Exploit kits

A

A software toolkit used to take advantage of security weaknesses found in apps or operating systems, usually to deploy malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Firewall

A

A software program or hardware device designed to prevent unauthorized access to computers or networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Geotag

A

Data attached to a photograph that indicates the latitude and longitude where you were standing when you took the photo

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Grey-hat hacker

A

A cross between black and white - hacker who will often illegally break into the systems merely to flaunt his or her expertise to the administrator or to attempt to sell his or her services in repairing security breaches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Hacker

A

Anyone who unlawfully breaks into a computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Identity theft

A

The process by which someone uses personal information about someone else to assume the victim’s identity for the purpose of defrauding another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Image backup

A

A copy of an entire computer system, created for restoration purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Incremental backup

A

A type of backup that only backs up files that have changed since the last time files were backed up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Inoculation

A

A process used by antivirus software that compares old and current qualities of files to detect viral activity

28
Q

Keystroke logger

A

A type of spyware program that monitors keystrokes with the intent of stealing passwords, login IDs or credit card information

29
Q

Logical port

A

A virtual communications gateway or path that enables a computer to organize requests for information from other networks or computers

30
Q

Logical port blocking

A

A condition in which a firewall is configured to ignore all incoming packets that request access to a certain port that that no unwanted requests will get through to the computer

31
Q

Logic bomb

A

A computer virus that runs when a certain set of conditions is met, such as when a program is launched a specific number of times

32
Q

Macro virus

A

A virus that is distributed by hiding inside a macro - small program that groups a series of commands to run as a single command

33
Q

Malware

A

Software that is intended to render a system temporarily or permanently useless or to penetrate a computer system completely for purposes of information gathering
- spyware, viruses, worms and Trojan horses are examples

34
Q

Master boot record

A

A small program that runs whenever a computer boots up

35
Q

Multi-factor authentication

A

A process that require two of three assigned factors be demonstrated before authentication is granted

36
Q

Multipartite virus

A

Literally meaning “multipart” virus - computer virus that attempts to infect computers using more than one method

37
Q

Network address translation (NAT)

A

A process that firewalls use to assign internal Internet protocol addresses on a network

38
Q

Packet analyzer (sniffer)

A

A computer hardware device or software program that is designed to detect and record digital information being transmitted over a network

39
Q

Packet filtering

A

A process in which firewalls are configured so that they filter out packets sent to specific logical ports

40
Q

Personal firewall

A

A firewall specifically designed for home networks

41
Q

Pharming

A

Planting malicious code on a computer that alters the browser’s ability to find web addresses and that directs users to bogus websites

42
Q

Phishing

A

The process of sending email messages to lure Internet users into revealing personal information such as credit card or social security numbers or other sensitive info that could lead to identity theft

43
Q

Polymorphic virus

A

A virus that changes its virus signature every time it infects a new file
- makes it hard for antivirus programs to detect the virus

44
Q

Pretexting

A

The act of creating an invented scenario to convince someone to divulge information

45
Q

Program file

A

Files that are used in the running of software programs and that do not store data

46
Q

Quarantining

A

The placement of a computer virus in a secure area on the hard drive so that it won’t spread infection to other files

47
Q

Rootkit

A

Programs that allow hackers to gain access to your computer and take almost complete control of it without your knowledge
- designed to subvert normal login procedures to a computer and hide their operations from normal detection methods

48
Q

Scareware

A

A type of malware that is downloaded onto your computer and that tries to convince you that your computer is infected with a virus or other type of malware

49
Q

Script

A

A list of commands that can be executed on a computer without user interaction

50
Q

Social engineering

A

Any technique that uses social skills to generate human interaction for the purpose of enticing individuals to reveal sensitive information

51
Q

Spam

A

Unwanted or junk email

52
Q

Spam filter

A

An option you can select in your email account that places known or suspected spam messages into a folder other than your inbox

53
Q

Spear phishing

A

A targeting phishing attack that sends emails to people known to be customers of a company
- have a much greater change of successfully getting individuals to reveal sensitive data

54
Q

Spyware

A

An unwanted piggyback program that downloads with the software you want to install from the Internet and then runs in the background of your system

55
Q

Stealth virus

A

A virus that temporarily erases its code from the files where it resides and hides in the active memory of the computer

56
Q

Surge protector

A

A device that protects computers and other electronic devices from power surges

57
Q

Time bomb

A

A virus that is triggered by the passage of time or on a certain date

58
Q

Trojan horse

A

A computer program that appears to be something useful or desirable but at the same time does something malicious in the background without the user’s knowledge

59
Q

Virtual private network (VPN)

A

A network that uses the public Internet communications infrastructure to build a secure, private network among various locations

60
Q

Virus

A

A computer program that attaches itself to another computer program and attempts to spread itself to other computers when files are exchanged

61
Q

Virus signature

A

A portion of the virus code that is unique to a particular computer virus and that makes it identifiable by antivirus software

62
Q

White-hat hacker

A

A hacker who breaks into systems just for the challenge of it
- tout themselves as experts who are performing a needed service for society by helping companies realize the vulnerabilities that exist in their systems

63
Q

Whole-house surge protector

A

A surge protector that is installed on the breaker panel of a home and that protects all electronic devices in the home from power surges

64
Q

Worm

A

A program that attempts to travel between systems through network connection to spread infections
- run independently of host file execution and are active in spreading themselves

65
Q

Zombie

A

A computer that is controlled by a hacker who uses it to launch attacks on another computer system