chapter eleven Flashcards
computer security
is concerned with risk management, confidentiality, integrity, and the availability of the electronic information that is processed and stored within a computing system
risk management
the recognition, consequences, and assessment of risk to a computer’s assets, and developing strategies to manage and protect them
why is a computer a highly attractive target for an intruder or hacker?
it holds valuable information like credit card numbers, passwords, bank account information, music files, and sensitive business data
hacker/hacktivist
someone who attempts to invade or disable a computer’s security measures and then to steal the computer resources at their leisure
computer hackers are not just after information…
they also attempt to hijack heavily sought-after computing processing cycles and speed, as well as storage space
unsecured computer
extremely easy to breach
what is the key aspect of an Intranet?
privacy
firewall
specialized hardware and software working together that ensures that only authorized personnel and employees within a business can use its Intranet
without a firewall, an Intranet is just…
another part of the Internet
proxy server
a precaution to protect from any external threats, any communications in or out of an intranet pass through this special security computer
how does a firewall control the flow of data?
by opening or closing ports for the various transmission protocols like http, email, ftp, etc.
“default-deny” firewall rule
the only network connections that are permitted are the ones that have been explicitly allowed
“default-allow” firewall rule
set in that all traffic is allowed unless it has been specifically blooked
which configuration is the most difficult and detailed?
“default-deny”
computer virus/ metamorphic viruses
computer files that reproduce by making copies of them within a computer’s memory, storage, or on a network
malware
programs specifically intended to penetrate or damage a computer system without the end user’s knowledge
experimental malware
written as a research project to understand how to combat them
what is malware most often used for?
financial gain (identity theft, plant spyware, or extortion)
worms
like a virus in that it is self-replicating but can be potentially more insidious in that it does not need to attach itself to an existing program to spread
what do worms use to travel?
networks
how can a worm harm a computer system?
slowing a computer’s performance, erasing files, and damaging physical hardware
trojan horses
a program that often seems harmless and possibly interesting at first until it is executed
when are Trojan horses executed?
need no user intervention but, instead, wait for a particular computer action or even a particular date
spyware
a computer program that is installed covertly on a computer to capture or take control of the system without the user’s knowledge or consent
spyware secretly…
monitors a user’s keystroke and behavior
“spyware cleaning software”
sometimes a third party pretends to be able to fix spyware only to employ their own spyware
adware/ advertising-supported software
typically more irritating to a user as it is not usually as malicious
what is the motivation for adware?
economic