chapter eleven Flashcards

1
Q

computer security

A

is concerned with risk management, confidentiality, integrity, and the availability of the electronic information that is processed and stored within a computing system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

risk management

A

the recognition, consequences, and assessment of risk to a computer’s assets, and developing strategies to manage and protect them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

why is a computer a highly attractive target for an intruder or hacker?

A

it holds valuable information like credit card numbers, passwords, bank account information, music files, and sensitive business data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

hacker/hacktivist

A

someone who attempts to invade or disable a computer’s security measures and then to steal the computer resources at their leisure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

computer hackers are not just after information…

A

they also attempt to hijack heavily sought-after computing processing cycles and speed, as well as storage space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

unsecured computer

A

extremely easy to breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is the key aspect of an Intranet?

A

privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

firewall

A

specialized hardware and software working together that ensures that only authorized personnel and employees within a business can use its Intranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

without a firewall, an Intranet is just…

A

another part of the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

proxy server

A

a precaution to protect from any external threats, any communications in or out of an intranet pass through this special security computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

how does a firewall control the flow of data?

A

by opening or closing ports for the various transmission protocols like http, email, ftp, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

“default-deny” firewall rule

A

the only network connections that are permitted are the ones that have been explicitly allowed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

“default-allow” firewall rule

A

set in that all traffic is allowed unless it has been specifically blooked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

which configuration is the most difficult and detailed?

A

“default-deny”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

computer virus/ metamorphic viruses

A

computer files that reproduce by making copies of them within a computer’s memory, storage, or on a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

malware

A

programs specifically intended to penetrate or damage a computer system without the end user’s knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

experimental malware

A

written as a research project to understand how to combat them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

what is malware most often used for?

A

financial gain (identity theft, plant spyware, or extortion)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

worms

A

like a virus in that it is self-replicating but can be potentially more insidious in that it does not need to attach itself to an existing program to spread

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

what do worms use to travel?

A

networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

how can a worm harm a computer system?

A

slowing a computer’s performance, erasing files, and damaging physical hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

trojan horses

A

a program that often seems harmless and possibly interesting at first until it is executed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

when are Trojan horses executed?

A

need no user intervention but, instead, wait for a particular computer action or even a particular date

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

spyware

A

a computer program that is installed covertly on a computer to capture or take control of the system without the user’s knowledge or consent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

spyware secretly…

A

monitors a user’s keystroke and behavior

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

“spyware cleaning software”

A

sometimes a third party pretends to be able to fix spyware only to employ their own spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

adware/ advertising-supported software

A

typically more irritating to a user as it is not usually as malicious

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

what is the motivation for adware?

A

economic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

spam or junk email

A

the abuse of an email system to arbitrarily send millions of unsolicited bulk messages

30
Q

is spam just limited to computers?

A

no, faxes, phones, blogs, and newsgroups as well

31
Q

denial-of-service (DoS)

A

an attempt to make a computer or any of its resources unavailable to its intended users

32
Q

how does DoS slow down a computer?

A

extra computing cycles being used up and it will often simply stop running altogether, thereby denying any use of the computer

33
Q

reverse phishing/keylogging

A

a perpetrator logs on to a computer workstation and installs a program that simply records every keystroke made at the workstation’s keyboard

34
Q

how does keylogging work?

A

waits for a legitimate user to sign in, and then the keylogging software records the login ID, password, and any other sensitive information

35
Q

antivirus software

A

includes computer programs that attempt to identify, prevent and eliminate computer viruses and malware, typically before they reach a computing system or network

36
Q

what are two popular antivirus programs?

A

Symantec Corporation’s Norton AntiVirus

McAfee’s VirusScan

37
Q

updates/system patches

A

Microsoft and Mac OS are constantly vigilant to protect their user’s operating systems

38
Q

malevolent attachment

A

often an executable program that waits for an event for the program to run, and often the event is simply downloading it from an email

39
Q

strong passwords consist of…

A

typically between 8 to 12 characters

mixed case letters, numbers, and special characters

40
Q

what is the problem with a strong password?

A

they are hard to remember

41
Q

passphrase

A

a strong memorable password

42
Q

internet fraud

A

refers to any fraudulent activity in an online setting

43
Q

how does internet fraud occur?

A

through email systems, message boards, chat rooms, or websites

44
Q

what are some of the more serious crimes committed on the internet?

A

stealing credit card numbers and intercepting wire transfers

45
Q

stealing credit card information->constitutes

A

identity theft

46
Q

click fraud

A

schemes have been developed by hackers by writing programs inserted into advertising network websites that automatically pass a user to the advertiser whether they had any intention of visiting or not, and subsequently collecting the ill-gotten per-click fee

47
Q

purchase scams

A

a buyer (typically in another country) who approaches merchants via spam and asks if they can pay for shipping with a credit card, credit card is cancelled

48
Q

Google AdSense

A

advertising network

49
Q

phishing

A

involves using social engineering techniques and attempts to deceptively gain private information, like usernames, PIN numbers, passwords and credit card details by masquerading as a legitimate business organization, typically in a legitimate looking email

50
Q

what are two very common targets for phishing schemes?

A

PayPal and eBay

51
Q

what does a phisher what?

A

control of the bank account

52
Q

privacy

A

the ability of an individual to keep their personal information out of public view

53
Q

anonymous

A

one’s personal identity is not known

54
Q

“tracking cookie”

A

the cookie fills in information like a personal greeting along with the user’s name, address, and credit card information so it does not have to be re-entere

55
Q

you don’t visit a website…

A

it visits you

56
Q

what is an advantage of a cookie?

A

the user doesn’t have to fill out information multiple times

57
Q

what is a disadvantage of a cookie?

A

they can be used for tracking website browsing behavior

58
Q

data mining

A

experts extract useful data and information from recorded data, like a cookie

59
Q

computer privacy

A

protecting one of its most important assets: its data and information

60
Q

history files

A

a list of stored or cached websites on a user’s computer that are essentially an account of where and what a user’s web browser has visited on the web

61
Q

identity theft

A

a crime concerning the unlawful practice of assuming another individual’s identity

62
Q

what is one of the fastest growing crimes in the United States and Canada?

A

identity

63
Q

what is the key piece of information a criminal needs to steal an identity?

A

social security number

64
Q

credit.undefined

A

someone with another person’s social security can attempt to apply

65
Q

shoulder surfing

A

a criminal in a public place will simply glance over their victims’ shoulder and watch them dial a phone number, or type in a password on a laptop, or simply listen for a credit card number

66
Q

dumpster diving

A

criminals sift through trash to get information

67
Q

SCAM

A

Stingy
Check
Ask
Maintain

68
Q

“Stingy”

A

be stingy, treat all of your personal information on a “need to know” basis

69
Q

“Check”

A

check your financial information on a regular basis and inspect what should and shouldn’t be there

70
Q

“Ask”

A

ask periodically for your credit report: it is a good idea to check your credit score on a regular basis as a barometer of your financial status and watch for any unusual fluctuations

71
Q

“Maintain”

A

maintain careful records of your banking and financial records