Com Security, Safety, Ethics, and Privacy Flashcards

REVIEWER

1
Q

is any event or action that could
cause a loss of or damage to computer hardware, software, data, information, or processing capability

A

computer security risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

is an online or Internet-based illegal act

A

cybercrime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Examples of cybercrime

A

cybercrime, Crackers Script Kiddies Corporate Spies, Unethical Employees, Cyber extortionists Cyberterrorists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

examples of Computer Security Risks

A

internet and network attacks; unauthorized access and use; system failure; information theft; hardware theft; and software theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

is a Web site that evaluates
your computer to check for Internet and e-mail vulnerabilities

A

online security service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Affects a computer negatively by altering the way the computer works

A

Computer Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Copies itself repeatedly, using up resources and possibly shutting down the computer or network

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A malicious program that hides within or looks like a legitimate program

A

Trojan Horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Program that hides in a computer and allows someone from a remote location to take full control

A

Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Internet and Network Attacks:
is a group of compromised computers connected to a network

A

botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A compromised computer

A

zombie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Internet and Network Attacks:
disrupts computer access to
Internet services

A

denial of service attack (DoS attack)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Internet and Network Attacks:
is a program or set of instructions in a program that allow users to bypass security controls

A

back door

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Internet and Network Attacks:
is a technique intruders use to make their network or Internet transmission appears legitimate

A

Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

is hardware and/or software that protects a network’s resources from intrusion

A

firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  • Analyzes all network traffic
  • Assesses system vulnerabilities
  • Identifies any unauthorized intrusions
  • Notifies network administrators of suspicious behavior patterns or security breaches
A

Intrusion detection software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
  • Vulnerable computer that is set up to entice an intruder to break into it
A

Honeypot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

is the use of a computer or
network without permission

A

Unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

is the use of a computer or its data for unapproved or possibly illegal activities

A

Unauthorized use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Access controls define who can access a computer, when they can access it, and what actions they can take

A

– identification and authentication
– User name
– Password
– CAPTCHA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

authenticates a person’s identity by translating a personal characteristic into a digital code that is compared with a digital code in a computer

A

biometric device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

is the discovery, collection, and analysis of evidence found on computers and networks

A

Digital forensics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Areas that uses digital forensics

A

Law enforcement; Criminal prosecutors; Military intelligence; Insurance agencies; Information security departments

25
Q

is the act of stealing computer equipment

A

Hardware theft

26
Q

is the act of defacing or destroying computer equipment

A

Hardware vandalism

27
Q

Hardware Theft and Vandalism:
To help reduce the of chances of theft, companies and schools use a variety of security measures

A
  • Physical access controls
  • Alarm systems
  • Cables to lock equipment
  • Real time location system
  • Passwords, possessed objects, and biometrics
28
Q

Software theft occurs when someone

A
  • Steals software media
  • Intentionally erases programs
  • Illegally copies a program
  • Illegally registers and/or activates a - program
29
Q

occurs when someone steals personal or confidential information

A

Information theft

30
Q

is a process of converting readable
data into unreadable characters to prevent unauthorized access

A

Encryption

31
Q

is an encrypted code that a person, Web site, or organization attaches to an electronic message to verify the identity of the sender

A

digital signature

32
Q

Popular security techniques include:

A
  • Digital Certificates
  • Transport Layer Security (TLS)
  • Secure
  • HTTP
  • VPN
33
Q

is the prolonged malfunction of a
computer

A

System Failure

34
Q

A variety of factors can lead to system failure, including:

A

– Aging hardware
– Natural disasters
– Electrical power problems
– Errors in computer programs

35
Q

Two ways to protect from system failures caused by electrical power variations

A

surge protectors and uninterruptable power supplies(UPS)

36
Q
A
37
Q

is a duplicate of a file, program, or disk
that can be used if the original is lost, damaged, or destroyed

A

backup

38
Q

Two categories of backups:

A

– Full backup
– Selective backup

39
Q

The widespread use of computers has led to health concerns

A
  • Repetitive strain injury (RSI)
    – Carpal tunnel syndrome (CTS)
    – Computer vision syndrome (CVS)
40
Q

an applied science devoted
to incorporating comfort, efficiency, and safety into the design of items in the workplace

A

Ergonomics

41
Q

occurs when the computer consumes someone’s entire social life

A

Computer addiction

42
Q

the moral guidelines that govern the use of computers and information systems

A

Computer ethics

43
Q

are the rights to which creators are entitled for their work

A

Intellectual property rights

44
Q

protects any tangible form of expression

A

copyright

45
Q

is a written guideline that helps
determine whether a specific computer action is ethical or unethical

A

IT code of conduct

46
Q

involves reducing the electricity and environmental waste while using a computer

A

Green computing

47
Q

refers to the right of individuals and companies to deny or restrict the collection and use of information about them

A

Information privacy

48
Q

is a small text file that a Web server stores on your computer

A

cookie

49
Q

Web sites use cookies for a variety of reasons:

A

-Allow for personalization
-Store users’ passwords
-Assist with online shopping
-Track how often users visit a site
-Target advertisements

50
Q

is an unsolicited e-mail message or newsgroup posting

A

Spam

51
Q

blocks e-mail messages from designated sources

A

E-mail filtering

52
Q

attempt to remove spam before it reaches your inbox

A

Anti-spam programs

53
Q

is a scam in which a perpetrator sends
an official looking e-mail message that attempts to obtain your personal and financial information

A

Phishing

54
Q

is a scam where a perpetrator attempts to obtain your personal and financial information via spoofing

A

Pharming

55
Q

limits the rights of others viewing a credit report to only those with a legitimate business need

A

1970 Fair Credit Reporting Act

56
Q

is defined as gaining unauthorized access or obtaining confidential information by taking advantage of trust and naivety

A

Social engineering

57
Q

involves the use of computers to observe, record, and review an employee’s use of a computer

A

Employee monitoring

58
Q

is the process of restricting access to certain material on the Web

A

Content filtering

59
Q

restricts access to specified Web sites

A

Web filtering software