Computer threats Flashcards

1
Q

what is a cybercrime

A

instances when criminals, known as hackers or attackers, access your computer for malicious reasons

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

when can you fall victim to cyber crime

A

any time you are on an unprotected computer, receive a deceptive email claiming that is an “urgent matter” regarding your monster account or just surfing the web.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what might be criminals seeking

A

sensitive, personal identification information stored on your computer, like credit car numbers or private account logins they use for financial gain or to access your online services for criminal purposes. or they could want your computer’s resources including your internet connection, to increase their bandwidth fr infecting other computers. (this also allows them to hide their true location as they launch attacks.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

why is it important that we are able to find criminals easily

A

the more computers a criminal hids behind, the harder it becomes for law enforcement to figure out where the criminal is. if the criminal cant be found, he cant be stopped and prosecuted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

name 5 different computer threats

A

vulnerabilities
spyware
spam
malware
phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is a vulnerability

A

flaws in computer software that create weaknesses in your computer or network’s overall security or improper computer or security configurations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

how do vulnerabilities attack

A

threats exploit the weaknesses of vulnerabilities, resulting in potential damage to the computer or its data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

how do you know about vulnerabilities

A

companies announce vulnerabilities as they are discovered and quickly work to fix them with software and security “patches”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what should you do when you suspect a vulnerability attack

A

keep software and security patches up to date

configure security settings for your operating system, internet browser and security software

companies should develop personal security policies for online behaviour, and individuals should be sure to adopt their own policies to promote online security

install a proactive security solution like norton internet security to block threats targeting vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How can you get Spyware

A

You can download it from web sites, email messages, instant messages and direct file-sharing connections. A user may unknowingly receive Spyware by accepting an end user license agreement from a software program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Can you know if you have Spyware

A

It attempts to remain unnoticed, either by actively hiding or simply not making its presence on a system known to the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What should you do if you have Spyware

A

Use a reputable internet security program to proactively protect yourself from Spyware and other security risks

Configure the firewall in the reputable internet security program to block unsolicited requests for outbound communication.

Do not accept or open suspicious error dialogs from within the browser.

Spyware may come as part of a “free deal” offer- do not accept free deals

Always carefully read the end user license agreement at install time and cancel if other “programs” are being installed as part of the desired program

Keep software and security patches up to date

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is spam

A

It is the electronic version of junk mail. It involves sending unwanted messages, often unsolicited advertising, to a large number of receipts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why is spam a serious security concern

A

It can be used to deliver email that could contain Trojan horses, viruses, worms, Spyware, and targeted attacks aimed at obtaining sensitive, personal identification information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How do you know its a spam

A

The messages include your email address in the to or cc fields are common forms of spam. Some spam contain offensive language or links to web sites with inappropriate content. Also, some spam may include hidden text that only becomes visible if you highlight the content– a common trick spammers use to get their email to pass through spam filters without detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What should you do if you have spam

A

Install spam filtering/blocking software

If you suspect an email is spam, do not respond– just delete it

Consider disabling your email’s preview pane and reading emails in plain text

Reject all instant messages from people who are not on your buddy list

Do not click on url links within IM unless they are from a known source and expected

Keep software and security patches up to date

17
Q

What is Malware

A

It Is a category of malicious code that includes viruses, worms and Trojan horses