chapter eleven Flashcards

1
Q

computer security

A

is concerned with risk management, confidentiality, integrity, and the availability of the electronic information that is processed and stored within a computing system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

risk management

A

the recognition, consequences, and assessment of risk to a computer’s assets, and developing strategies to manage and protect them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

why is a computer a highly attractive target for an intruder or hacker?

A

it holds valuable information like credit card numbers, passwords, bank account information, music files, and sensitive business data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

hacker/hacktivist

A

someone who attempts to invade or disable a computer’s security measures and then to steal the computer resources at their leisure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

computer hackers are not just after information…

A

they also attempt to hijack heavily sought-after computing processing cycles and speed, as well as storage space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

unsecured computer

A

extremely easy to breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is the key aspect of an Intranet?

A

privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

firewall

A

specialized hardware and software working together that ensures that only authorized personnel and employees within a business can use its Intranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

without a firewall, an Intranet is just…

A

another part of the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

proxy server

A

a precaution to protect from any external threats, any communications in or out of an intranet pass through this special security computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

how does a firewall control the flow of data?

A

by opening or closing ports for the various transmission protocols like http, email, ftp, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

“default-deny” firewall rule

A

the only network connections that are permitted are the ones that have been explicitly allowed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

“default-allow” firewall rule

A

set in that all traffic is allowed unless it has been specifically blooked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

which configuration is the most difficult and detailed?

A

“default-deny”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

computer virus/ metamorphic viruses

A

computer files that reproduce by making copies of them within a computer’s memory, storage, or on a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

malware

A

programs specifically intended to penetrate or damage a computer system without the end user’s knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

experimental malware

A

written as a research project to understand how to combat them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

what is malware most often used for?

A

financial gain (identity theft, plant spyware, or extortion)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

worms

A

like a virus in that it is self-replicating but can be potentially more insidious in that it does not need to attach itself to an existing program to spread

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

what do worms use to travel?

A

networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

how can a worm harm a computer system?

A

slowing a computer’s performance, erasing files, and damaging physical hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

trojan horses

A

a program that often seems harmless and possibly interesting at first until it is executed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

when are Trojan horses executed?

A

need no user intervention but, instead, wait for a particular computer action or even a particular date

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

spyware

A

a computer program that is installed covertly on a computer to capture or take control of the system without the user’s knowledge or consent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
spyware secretly...
monitors a user's keystroke and behavior
26
"spyware cleaning software"
sometimes a third party pretends to be able to fix spyware only to employ their own spyware
27
adware/ advertising-supported software
typically more irritating to a user as it is not usually as malicious
28
what is the motivation for adware?
economic
29
spam or junk email
the abuse of an email system to arbitrarily send millions of unsolicited bulk messages
30
is spam just limited to computers?
no, faxes, phones, blogs, and newsgroups as well
31
denial-of-service (DoS)
an attempt to make a computer or any of its resources unavailable to its intended users
32
how does DoS slow down a computer?
extra computing cycles being used up and it will often simply stop running altogether, thereby denying any use of the computer
33
reverse phishing/keylogging
a perpetrator logs on to a computer workstation and installs a program that simply records every keystroke made at the workstation's keyboard
34
how does keylogging work?
waits for a legitimate user to sign in, and then the keylogging software records the login ID, password, and any other sensitive information
35
antivirus software
includes computer programs that attempt to identify, prevent and eliminate computer viruses and malware, typically before they reach a computing system or network
36
what are two popular antivirus programs?
Symantec Corporation's Norton AntiVirus | McAfee's VirusScan
37
updates/system patches
Microsoft and Mac OS are constantly vigilant to protect their user's operating systems
38
malevolent attachment
often an executable program that waits for an event for the program to run, and often the event is simply downloading it from an email
39
strong passwords consist of...
typically between 8 to 12 characters | mixed case letters, numbers, and special characters
40
what is the problem with a strong password?
they are hard to remember
41
passphrase
a strong memorable password
42
internet fraud
refers to any fraudulent activity in an online setting
43
how does internet fraud occur?
through email systems, message boards, chat rooms, or websites
44
what are some of the more serious crimes committed on the internet?
stealing credit card numbers and intercepting wire transfers
45
stealing credit card information->constitutes
identity theft
46
click fraud
schemes have been developed by hackers by writing programs inserted into advertising network websites that automatically pass a user to the advertiser whether they had any intention of visiting or not, and subsequently collecting the ill-gotten per-click fee
47
purchase scams
a buyer (typically in another country) who approaches merchants via spam and asks if they can pay for shipping with a credit card, credit card is cancelled
48
Google AdSense
advertising network
49
phishing
involves using social engineering techniques and attempts to deceptively gain private information, like usernames, PIN numbers, passwords and credit card details by masquerading as a legitimate business organization, typically in a legitimate looking email
50
what are two very common targets for phishing schemes?
PayPal and eBay
51
what does a phisher what?
control of the bank account
52
privacy
the ability of an individual to keep their personal information out of public view
53
anonymous
one's personal identity is not known
54
"tracking cookie"
the cookie fills in information like a personal greeting along with the user's name, address, and credit card information so it does not have to be re-entere
55
you don't visit a website...
it visits you
56
what is an advantage of a cookie?
the user doesn't have to fill out information multiple times
57
what is a disadvantage of a cookie?
they can be used for tracking website browsing behavior
58
data mining
experts extract useful data and information from recorded data, like a cookie
59
computer privacy
protecting one of its most important assets: its data and information
60
history files
a list of stored or cached websites on a user's computer that are essentially an account of where and what a user's web browser has visited on the web
61
identity theft
a crime concerning the unlawful practice of assuming another individual's identity
62
what is one of the fastest growing crimes in the United States and Canada?
identity
63
what is the key piece of information a criminal needs to steal an identity?
social security number
64
credit.undefined
someone with another person's social security can attempt to apply
65
shoulder surfing
a criminal in a public place will simply glance over their victims' shoulder and watch them dial a phone number, or type in a password on a laptop, or simply listen for a credit card number
66
dumpster diving
criminals sift through trash to get information
67
SCAM
Stingy Check Ask Maintain
68
"Stingy"
be stingy, treat all of your personal information on a "need to know" basis
69
"Check"
check your financial information on a regular basis and inspect what should and shouldn't be there
70
"Ask"
ask periodically for your credit report: it is a good idea to check your credit score on a regular basis as a barometer of your financial status and watch for any unusual fluctuations
71
"Maintain"
maintain careful records of your banking and financial records