Com Security, Safety, Ethics, and Privacy Flashcards
REVIEWER
is any event or action that could
cause a loss of or damage to computer hardware, software, data, information, or processing capability
computer security risk
is an online or Internet-based illegal act
cybercrime
Examples of cybercrime
cybercrime, Crackers Script Kiddies Corporate Spies, Unethical Employees, Cyber extortionists Cyberterrorists
examples of Computer Security Risks
internet and network attacks; unauthorized access and use; system failure; information theft; hardware theft; and software theft
is a Web site that evaluates
your computer to check for Internet and e-mail vulnerabilities
online security service
Affects a computer negatively by altering the way the computer works
Computer Virus
Copies itself repeatedly, using up resources and possibly shutting down the computer or network
Worm
A malicious program that hides within or looks like a legitimate program
Trojan Horse
Program that hides in a computer and allows someone from a remote location to take full control
Rootkit
Internet and Network Attacks:
is a group of compromised computers connected to a network
botnet
A compromised computer
zombie
Internet and Network Attacks:
disrupts computer access to
Internet services
denial of service attack (DoS attack)
Internet and Network Attacks:
is a program or set of instructions in a program that allow users to bypass security controls
back door
Internet and Network Attacks:
is a technique intruders use to make their network or Internet transmission appears legitimate
Spoofing
is hardware and/or software that protects a network’s resources from intrusion
firewall
- Analyzes all network traffic
- Assesses system vulnerabilities
- Identifies any unauthorized intrusions
- Notifies network administrators of suspicious behavior patterns or security breaches
Intrusion detection software
- Vulnerable computer that is set up to entice an intruder to break into it
Honeypot
is the use of a computer or
network without permission
Unauthorized access
is the use of a computer or its data for unapproved or possibly illegal activities
Unauthorized use
Access controls define who can access a computer, when they can access it, and what actions they can take
– identification and authentication
– User name
– Password
– CAPTCHA
authenticates a person’s identity by translating a personal characteristic into a digital code that is compared with a digital code in a computer
biometric device
is the discovery, collection, and analysis of evidence found on computers and networks
Digital forensics