Computer Security, Safety, Ethics and Privacy Flashcards
Action that causes loss of or damage to computer system.
Computer Security Risk
is a potentially damaging computer
program. Can spread and damage
files.
Virus
copies itself repeatedly, using up resources
and possibly shutting down computer or
network.
Worm
hides within or looks like a legitimate
program until triggered. Does not
replicate itself on other computers.
Trojan
can be a small program, or script, that
automates common tasks. These scripts are usually run within other programs.
Macros
Set macro security level in applications that allow you to write macros
such as in MS Word, MS Excel, etc.
Identifies and removes computer viruses. Most also protect against worms and
Trojan horses.
Antivirus Program
Specific pattern of
virus code
Virus Signature
Also called virus definition
Virus Signature
Antivirus programs
look for virus
signatures
How does an
antivirus program
inoculate a
program file?
- Records information about programs such as file size and creation date.
- Attempts to remove any detected virus
- Uses information to detect if virus tampers with file.
- Quarantines infected files that it cannot remove.
- Keeps file in separate area of hard disk
is an assault which disrupts computer access to an Internet service such as the Web or e mail
denial of service attack
is a program or set of instructions
in a program that allow users to bypass
security controls when accessing a computer
resource
Back door
Makes a network or Internet
transmission appear legitimate
Spoofing
occurs when an intruder
computer fools a network into believing
its IP address is from a trusted source. It trick their victims into interacting with a phony Web site.
IP Spoofing
Security system consisting of hardware and/or software that prevents unauthorized intrusion.
Firewall
Program that protects personal computer and its data from unauthorized intrusions and Monitors transmissions to and from computer.
Personal Firewall Utility
Informs you of attempted
intrusion
Personal Firewall Utility
defines who can access computer & what
actions they can take
Access Control
records
access attempts
Audit Trail
analyzes network traffic, assesses system
vulnerabilities, and identifies intrusions and suspicious behavior
Intrusion Detection Software
What are other ways to
protect your personal
computer?
Disable file and
printer sharing on
Internet connection
Unique combination
of characters that
identifies user
user name
is private
combination of
characters
associated
with the user name
that allows access
to computer
resources
Password
Item that you must carry
to gain access to
computer or facility
Often used with
numeric password
called personal
identification
number (PIN)
Possessed Object
Authenticates person’s identity using personal characteristic (Fingerprint, hand
geometry, voice, signature, and iris)
Biometric Device
is act of stealing
computer equipment
Hardware Theft
is act of defacing
or destroying computer equipment
Hardware Vandalism
Act of stealing or
illegally copying
software or
intentionally
erasing
programs
Software Theft
is illegal
duplication
of copyrighted
software
Software Piracy
Right to use software
license agreement
allows user to
install software on one
computer, make backup
copy, and sell software
after removing from
computer
Single user license
agreement
allows user to input product identification number online or by phone and receive unique installation identification number
Product Activation
promotes better understanding of software piracy problems
Business Software Alliance (BSA)
What are some other safeguards against software theft?
- Product Activation
- Business Software Alliance (BSA)
Safeguards against information theft
Process of converting plaintext (readable data) into ciphertext
(unreadable characters)
Encryption
often uses more than one method
To read the data, the recipient must decrypt , or decipher, the data
Encryption Key
How do Web browsers provide secure data
transmission?
- Secure Site
- Digital Certificate
- Many Web browsers
use encryption
is Web site that uses
encryption to secure
Secure Site
is notice that guarantees Web site is
legitimate
Digital Certificate
Authorized person or
company that issues
and verifies digital
certificates
Certificate Authority (CA)
Provides
encryption of all
data that passes
between client
and Internet
Secure Sockets Layer (SSL)
Web addresses
beginning with
“https” indicate
secure connections
Caused by aging hardware,
natural disasters, or electrical
power disturbances
system failure
Can cause loss of hardware,
software, or data. Prolonged malfunction of a computer
system failure
Protects computer and
equipment from electrical power
disturbances
Surge Protector
is surge protector that
provides power during power
loss
Uninterruptible power supply
(UPS)
Duplicate of file, program, or disk
Backup
Three Types of Backup
- Full backup
- Selective backup
- Three Generation Backup
In case of system failure or corrupted files,
restore files by copying to original location
How can I ensure my wireless communication is secure?
Secure your wireless access point (WAP) should not broadcast your network name
Enable Wired Equivalent Privacy or Wi Fi Protected Access (WiFi)
WiFi
networks around
Luneta and Manila City
Hall, mapped using
wardriving
Moral guidelines that govern use of computers and information
systems
Computer Ethics
rights to
which creators are
entitled for their
work
Intellectual property rights
what are the list of computer ethics
- Software theft
- Information accuracy
- Codes of conduct
- Information privacy
- Intellectual property
rights - Unauthorized use of
computers and
networks
Written guideline that
helps determine
whether computer
action is ethical
IT code of conduct
Right of individuals and companies to
deny or restrict collection and use of
information about them
Information Privacy
is using
computers to observe
employee computer use
Employee Monitoring
Data collected when
you fill out form on
Web
Electronic Profile
Small file on
your
computer that
contains data
about you
cookie
Scam in which a perpetrator
sends an official looking
e mail that attempts
to obtain your personal and
financial information
phishing
is program
placed on computer
without user’s
knowledge
Spyware
is a program
that displays online
advertisements
Adware
Service that
blocks e mail
messages from
designated
sources
Collects spam in
central location
that you can
view any time
Email Filtering
Attempts to
remove spam
Sometimes
removes valid
e mail messages
Anti spam program
Process of restricting
access to certain material
Internet Content Rating
Association (ICRA)
provides rating system of
Web content
content filtering
restricts access to
specified sites
Web filtering software
Methods that guarantee a computer or network is safe from computer viruses, worms, and Trojan horses exist.
False
Web addresses of pages that use TLS (Transport Layer Security) typically begin with https, instead of http.
True
A cyberextortionist uses the Internet or network to destroy or damage computers for political reasons.
False
A brownout is a complete power failure.
False
A corrupt individual stealing credit card numbers to make fraudulent purchases is an example of information theft.
True
A surge protector absorbs small overvoltages — generally without damage to the computer or equipment.
True
A(n) ________ is someone who uses e-mail as a vehicle for extortion.
cyberextortionist
A standby UPS, sometimes called an offline UPS, runs constantly off the battery, which provides continuous protection.
It is illegal for employers to use software programs that monitor employees.
False
Although eyestrain associated with CVS (computer vision syndrome) is not thought to be disruptive or unpleasant, it has serious long-term consequences.
False
To prevent repetitive strain injury, take all of the following precautions except ____.
use the heel of the hand as a pivot point while typing or using the mouse
A(n) ____ is an injury or disorder of the muscles, nerves, tendons, ligaments, and joints.
RSI
A spyware program communicates information it collects to some inside source while a user is offline.
false
Web ____ software is a program that restricts access to specified Web sites.
filtering
Typically, the amount of protection offered by a surge protector is inversely proportional to its cost; that is, the more expensive, the more protection the protector offers.
True