module 7 Flashcards

1
Q

cybercrimes

A

criminal acts committed with the use of computers

it included fraud related crimes and non fraud related crimes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

non fraud related crimes

A

computer intrusion

child porn

unsolicited mails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

virus

A

infected program that attaches itself to another program and so on

it slows down the network and messes up a bunch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

how do viruses spread

A

sharing a disk or USB with infections

opening infected emails

downloading an infected file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what are the type of viruses

A

polymorphic virus

multipartite virus

stealth virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

polymorphic virus

A

rewrites itself to avoid detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

multipartite virus

A

infects multiple files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

stealth virus

A

erase their code from the hard drive

reside in the active memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is an anti virus software

A

software designed to detect viruses

looks for virus’ signature

provide different options for deleting or fixing infected files

need to updated frequently to be up to date with the viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what do hackers do

A

try to steal data on hard drives

steal credit card and bank account info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

how do hackers gain access to your computer

A

direct access (Hacking software)

indirect access (hacking internet connection or logical ports)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what are firewalls

A

software program or hardware designed to close logical port to invaders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what are the types of blue tooth attacks

A

blue snarfing

blue debugging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

blue snarfing

A

EXPLOIT FLAW TO STEAL INFO FROM UR DEVICE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

blue debugging

A

HACKER TAKE CONTROL OF THE DEVICE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

how to prevent blue tooth attacks

A

make device invisible

17
Q

should you use wifi from unknown sources

A

nah boy

18
Q

what are the risks of anonymous web surfing

A

might risk an s/o of viewing your data

hacking tool might already be installed

19
Q

whats a solutions to the risks of surfing anonymously on da web

A

ORTABLE PRIVACY DEVICE

LINUS OS ON A FLASH DRIVE

20
Q

what is the function of biometric devices

A

read personal characteristics

security identification and authentication device

recognising the identity of a living person based on a physiological or behavioral characteristic

21
Q

what are the characteristics of biometric devices

A

fingerprints

facial images

iris

voice recognition

22
Q

what is a malware

A

software with malicious intent

program or file that is harmful to a computer user

23
Q

what are types of malware

A

ADWARE

SPYWARE

VIRUSES

24
Q

what are solutions to malware

A

ANTIPRYWARE

ANTIVIRUS

25
Q

spam

A

unwanted or junk mail

use filter to vag on it

26
Q

spim

A

unwanted instant messaging

27
Q

what is phishing

A

fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information

such as passwords and credit card numbers

28
Q

hoaxing

A

attempt to make someone believe that something you know is false is true

29
Q

how to protect your physical assets

what to avoid

A

avoid sudden movement

avoid excessive heat or cold

avoid dust

avoid food and liquids

30
Q

what is a power surge

A

occurs when electricity is over 120 volts (in excess)

a spike in your home’s electrical current

spike is very brief, usually lasting less than a thousandth of a second, but it can still cause damage to your home and appliances

31
Q

causes of a power surge

A

OLD WIRING

DOWNED POWER LINES

MALFUNCTIONS AT THE SUBSTATIONS

LIGHTING STRIKE

32
Q

solutions to a power surge

A

BUY A SURGE PROTECTOR