module 7 Flashcards
cybercrimes
criminal acts committed with the use of computers
it included fraud related crimes and non fraud related crimes
non fraud related crimes
computer intrusion
child porn
unsolicited mails
virus
infected program that attaches itself to another program and so on
it slows down the network and messes up a bunch
how do viruses spread
sharing a disk or USB with infections
opening infected emails
downloading an infected file
what are the type of viruses
polymorphic virus
multipartite virus
stealth virus
polymorphic virus
rewrites itself to avoid detection
multipartite virus
infects multiple files
stealth virus
erase their code from the hard drive
reside in the active memory
what is an anti virus software
software designed to detect viruses
looks for virus’ signature
provide different options for deleting or fixing infected files
need to updated frequently to be up to date with the viruses
what do hackers do
try to steal data on hard drives
steal credit card and bank account info
how do hackers gain access to your computer
direct access (Hacking software)
indirect access (hacking internet connection or logical ports)
what are firewalls
software program or hardware designed to close logical port to invaders
what are the types of blue tooth attacks
blue snarfing
blue debugging
blue snarfing
EXPLOIT FLAW TO STEAL INFO FROM UR DEVICE
blue debugging
HACKER TAKE CONTROL OF THE DEVICE