module 7 Flashcards
cybercrimes
criminal acts committed with the use of computers
it included fraud related crimes and non fraud related crimes
non fraud related crimes
computer intrusion
child porn
unsolicited mails
virus
infected program that attaches itself to another program and so on
it slows down the network and messes up a bunch
how do viruses spread
sharing a disk or USB with infections
opening infected emails
downloading an infected file
what are the type of viruses
polymorphic virus
multipartite virus
stealth virus
polymorphic virus
rewrites itself to avoid detection
multipartite virus
infects multiple files
stealth virus
erase their code from the hard drive
reside in the active memory
what is an anti virus software
software designed to detect viruses
looks for virus’ signature
provide different options for deleting or fixing infected files
need to updated frequently to be up to date with the viruses
what do hackers do
try to steal data on hard drives
steal credit card and bank account info
how do hackers gain access to your computer
direct access (Hacking software)
indirect access (hacking internet connection or logical ports)
what are firewalls
software program or hardware designed to close logical port to invaders
what are the types of blue tooth attacks
blue snarfing
blue debugging
blue snarfing
EXPLOIT FLAW TO STEAL INFO FROM UR DEVICE
blue debugging
HACKER TAKE CONTROL OF THE DEVICE
how to prevent blue tooth attacks
make device invisible
should you use wifi from unknown sources
nah boy
what are the risks of anonymous web surfing
might risk an s/o of viewing your data
hacking tool might already be installed
whats a solutions to the risks of surfing anonymously on da web
ORTABLE PRIVACY DEVICE
LINUS OS ON A FLASH DRIVE
what is the function of biometric devices
read personal characteristics
security identification and authentication device
recognising the identity of a living person based on a physiological or behavioral characteristic
what are the characteristics of biometric devices
fingerprints
facial images
iris
voice recognition
what is a malware
software with malicious intent
program or file that is harmful to a computer user
what are types of malware
ADWARE
SPYWARE
VIRUSES
what are solutions to malware
ANTIPRYWARE
ANTIVIRUS
spam
unwanted or junk mail
use filter to vag on it
spim
unwanted instant messaging
what is phishing
fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information
such as passwords and credit card numbers
hoaxing
attempt to make someone believe that something you know is false is true
how to protect your physical assets
what to avoid
avoid sudden movement
avoid excessive heat or cold
avoid dust
avoid food and liquids
what is a power surge
occurs when electricity is over 120 volts (in excess)
a spike in your home’s electrical current
spike is very brief, usually lasting less than a thousandth of a second, but it can still cause damage to your home and appliances
causes of a power surge
OLD WIRING
DOWNED POWER LINES
MALFUNCTIONS AT THE SUBSTATIONS
LIGHTING STRIKE
solutions to a power surge
BUY A SURGE PROTECTOR