Computer threats Flashcards
what is a cybercrime
instances when criminals, known as hackers or attackers, access your computer for malicious reasons
when can you fall victim to cyber crime
any time you are on an unprotected computer, receive a deceptive email claiming that is an “urgent matter” regarding your monster account or just surfing the web.
what might be criminals seeking
sensitive, personal identification information stored on your computer, like credit car numbers or private account logins they use for financial gain or to access your online services for criminal purposes. or they could want your computer’s resources including your internet connection, to increase their bandwidth fr infecting other computers. (this also allows them to hide their true location as they launch attacks.)
why is it important that we are able to find criminals easily
the more computers a criminal hids behind, the harder it becomes for law enforcement to figure out where the criminal is. if the criminal cant be found, he cant be stopped and prosecuted
name 5 different computer threats
vulnerabilities
spyware
spam
malware
phishing
what is a vulnerability
flaws in computer software that create weaknesses in your computer or network’s overall security or improper computer or security configurations
how do vulnerabilities attack
threats exploit the weaknesses of vulnerabilities, resulting in potential damage to the computer or its data
how do you know about vulnerabilities
companies announce vulnerabilities as they are discovered and quickly work to fix them with software and security “patches”
what should you do when you suspect a vulnerability attack
keep software and security patches up to date
configure security settings for your operating system, internet browser and security software
companies should develop personal security policies for online behaviour, and individuals should be sure to adopt their own policies to promote online security
install a proactive security solution like norton internet security to block threats targeting vulnerabilities
How can you get Spyware
You can download it from web sites, email messages, instant messages and direct file-sharing connections. A user may unknowingly receive Spyware by accepting an end user license agreement from a software program.
Can you know if you have Spyware
It attempts to remain unnoticed, either by actively hiding or simply not making its presence on a system known to the user
What should you do if you have Spyware
Use a reputable internet security program to proactively protect yourself from Spyware and other security risks
Configure the firewall in the reputable internet security program to block unsolicited requests for outbound communication.
Do not accept or open suspicious error dialogs from within the browser.
Spyware may come as part of a “free deal” offer- do not accept free deals
Always carefully read the end user license agreement at install time and cancel if other “programs” are being installed as part of the desired program
Keep software and security patches up to date
What is spam
It is the electronic version of junk mail. It involves sending unwanted messages, often unsolicited advertising, to a large number of receipts.
Why is spam a serious security concern
It can be used to deliver email that could contain Trojan horses, viruses, worms, Spyware, and targeted attacks aimed at obtaining sensitive, personal identification information
How do you know its a spam
The messages include your email address in the to or cc fields are common forms of spam. Some spam contain offensive language or links to web sites with inappropriate content. Also, some spam may include hidden text that only becomes visible if you highlight the content– a common trick spammers use to get their email to pass through spam filters without detection