Computer Threats Flashcards
Define Computer network threat
any circumstance / that can harm the devices on a network
What is identity theft
stealing of one’s personal identity
what is industrial espionage
the illegal and unethical theft of business secrets for use by a competitor to gain a competitive advantage.
what is credit card fraud
unauthorized use of a credit/debit card to fraudulently obtain money or property.
what are some types of computer threats?
phishing, virus, trojan, pharming, worm, spyware, logic bombs
What is phishing?
Phishing is a method of engineering which is used to obtain sensitive information through the use of emails that look legitimate
What is a virus
A virus is a piece of software that is spread from one computer to another with the intent to corrupt and destroy data & information
Define Trojan
Trojan is a malicious code/software that tricks users into running it willingly by hiding behind a legitimate program
Define pharming
Pharming is a scamming practice in which a malicious code is installed on a PC/server then it misdirects users to fraudulent websites without their knowledge/consent.
Define worm
A computer worm is a malicious software program that infects other computers while remaining active on infected systems
Define spyware
Spyware is a type of malware that is installed on a computing device without the users knowledge. It invades the device and steals information then relays it to external users.
Define Logic Bombs
A logic bomb is a piece of code that implements a malicious function
What are some malicious functions that logic bombs carry out?
deleting important files
corrupting or altering data
reformatting a hard drive
Computer network is broken down into 2 parts, what are they?
Physical & Logical security
Give 4 resources used in physical security control
surveillance cameras
locks
security guards
keypad locks
What is physical security control designed to do?
to prevent unauthorized personnel from gaining access to a network and its components
What is the difference between motion detectors and biometric?
Motion detectors are used to sense activity and biometric is used to automatically recognize people by their biological or behavioral characteristics.
What is logical security designed to do?
to protect your computers and data from unauthorized access
Give three examples of what logical security does
it uses encryption, firewalls to protect usernames & passwords
What is a firewall?
a network security device that monitors incoming and outgoing network traffic and permits or blocks data packets.