Security Flashcards
To protect ourselves from threats, computer ______ needs to protect our information, hardware, and software from unauthorized use, as well as preventing or limiting damage from intrusions, sabotage, and natural disasters.
security
_________ or ________ is any criminal offense that involves a computer and a network. Often in news _________ which is a politically motivated cybercrime.
- cybercrime
- computer crime
- cyberterrorism
_______ is the illegal assumption of someone’s identity for the purposes of economic gain.
Identity theft
________ scams using the Internet. Have created financial and legal problems for many thousands of people.
Internet scams
______ is the unauthorized access of a computer network and copying files to or from the server.
Data manipulation
_________ is a malicious software that encrypts your computers data and ransoms the password to the user.
Ransomware
_________ attempt to slow down or stop a computer system or network by flooding a computer or network with requests for information and data.
Denial of Service (DoS) attacks
Widely used today is a variation known as _________, which coordinates several computers making repeated requests for service
distributed denial of service (DDoS)
_________ is the practice of manipulation people to divulge private data.
social engineering
One of the most common social engineering techniques is _______. Attempts to trick Internet users into thinking a fake but official-looking website or e-mail is legitimate.
phishing
A _______ is a computer criminal who creates and distributes malicious programs or _____, which is short for _______.
- cracker
- malware
- malicious software
Three most common types of malware are:
- Viruses
- Worms
- Trojan Horses
________ are programs that migrate through networks and operating systems, and mostly attach themselves to other programs and databases.
Viruses
______ are programs that simply replicate themselves over and over again.
Worms
_______ are programs that appear to be harmless but contain malicious programs. Not viruses but can be carriers of viruses.
trojan horses
______ are computers infected by a virus, worm , or trojan horse that allows them to be remotely controlled for malicious purposes. Collection of zombie computers is known as ______ or _______.
- Zombies
- botnet
- robot network
_______ imitate free Wi-Fi networks. They operate close to the legitimate free hotspots and typically provide stronger signals that many users unsuspectingly connect to.
Rogue Wi-Fi hotspots
_________ contain viruses and other malicious software. Are typically left in public spaces in hope others will find and plug them in.
Infected USB flash drives
_________ makes it a crime for unauthorized persons even to view- let alone copy or damage - data using any computer across state lines.
Computer Fraud and Abuse Act
___________ security experts are constantly devising ways to protect computer systems from access by unauthorized persons. Most common way to restrict access is with _________.
- Restricting Access
- passwords
A ________ uses software to try thousands of common words sequentially to gain unauthorized access to a users account.
dictionary attack
___________ accepts a series of gestures over a picture of the users choice to gain access. other times _______ such as fingerprint and iris scanner is used to restrict data. (ex: facial recognition)
- picture password
- biometric scanning
_______ provide a collection of utility programs designed to protect your privacy and security while you are on the web.
security suites
___________ act as a security buffer between a corporations private network and all external networks, including the internet.
Firewalls