Computer Security, Safety, Ethics and Privacy Flashcards
Action that causes loss of or damage to computer system.
Computer Security Risk
is a potentially damaging computer
program. Can spread and damage
files.
Virus
copies itself repeatedly, using up resources
and possibly shutting down computer or
network.
Worm
hides within or looks like a legitimate
program until triggered. Does not
replicate itself on other computers.
Trojan
can be a small program, or script, that
automates common tasks. These scripts are usually run within other programs.
Macros
Set macro security level in applications that allow you to write macros
such as in MS Word, MS Excel, etc.
Identifies and removes computer viruses. Most also protect against worms and
Trojan horses.
Antivirus Program
Specific pattern of
virus code
Virus Signature
Also called virus definition
Virus Signature
Antivirus programs
look for virus
signatures
How does an
antivirus program
inoculate a
program file?
- Records information about programs such as file size and creation date.
- Attempts to remove any detected virus
- Uses information to detect if virus tampers with file.
- Quarantines infected files that it cannot remove.
- Keeps file in separate area of hard disk
is an assault which disrupts computer access to an Internet service such as the Web or e mail
denial of service attack
is a program or set of instructions
in a program that allow users to bypass
security controls when accessing a computer
resource
Back door
Makes a network or Internet
transmission appear legitimate
Spoofing
occurs when an intruder
computer fools a network into believing
its IP address is from a trusted source. It trick their victims into interacting with a phony Web site.
IP Spoofing
Security system consisting of hardware and/or software that prevents unauthorized intrusion.
Firewall
Program that protects personal computer and its data from unauthorized intrusions and Monitors transmissions to and from computer.
Personal Firewall Utility
Informs you of attempted
intrusion
Personal Firewall Utility
defines who can access computer & what
actions they can take
Access Control
records
access attempts
Audit Trail
analyzes network traffic, assesses system
vulnerabilities, and identifies intrusions and suspicious behavior
Intrusion Detection Software
What are other ways to
protect your personal
computer?
Disable file and
printer sharing on
Internet connection
Unique combination
of characters that
identifies user
user name
is private
combination of
characters
associated
with the user name
that allows access
to computer
resources
Password
Item that you must carry
to gain access to
computer or facility
Often used with
numeric password
called personal
identification
number (PIN)
Possessed Object
Authenticates person’s identity using personal characteristic (Fingerprint, hand
geometry, voice, signature, and iris)
Biometric Device
is act of stealing
computer equipment
Hardware Theft
is act of defacing
or destroying computer equipment
Hardware Vandalism
Act of stealing or
illegally copying
software or
intentionally
erasing
programs
Software Theft
is illegal
duplication
of copyrighted
software
Software Piracy
Right to use software
license agreement
allows user to
install software on one
computer, make backup
copy, and sell software
after removing from
computer
Single user license
agreement