Security Flashcards

1
Q

To protect ourselves from threats, computer ______ needs to protect our information, hardware, and software from unauthorized use, as well as preventing or limiting damage from intrusions, sabotage, and natural disasters.

A

security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

_________ or ________ is any criminal offense that involves a computer and a network. Often in news _________ which is a politically motivated cybercrime.

A
  • cybercrime
  • computer crime
  • cyberterrorism
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

_______ is the illegal assumption of someone’s identity for the purposes of economic gain.

A

Identity theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

________ scams using the Internet. Have created financial and legal problems for many thousands of people.

A

Internet scams

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

______ is the unauthorized access of a computer network and copying files to or from the server.

A

Data manipulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

_________ is a malicious software that encrypts your computers data and ransoms the password to the user.

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

_________ attempt to slow down or stop a computer system or network by flooding a computer or network with requests for information and data.

A

Denial of Service (DoS) attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Widely used today is a variation known as _________, which coordinates several computers making repeated requests for service

A

distributed denial of service (DDoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

_________ is the practice of manipulation people to divulge private data.

A

social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

One of the most common social engineering techniques is _______. Attempts to trick Internet users into thinking a fake but official-looking website or e-mail is legitimate.

A

phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A _______ is a computer criminal who creates and distributes malicious programs or _____, which is short for _______.

A
  • cracker
  • malware
  • malicious software
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Three most common types of malware are:

A
  1. Viruses
  2. Worms
  3. Trojan Horses
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

________ are programs that migrate through networks and operating systems, and mostly attach themselves to other programs and databases.

A

Viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

______ are programs that simply replicate themselves over and over again.

A

Worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

_______ are programs that appear to be harmless but contain malicious programs. Not viruses but can be carriers of viruses.

A

trojan horses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

______ are computers infected by a virus, worm , or trojan horse that allows them to be remotely controlled for malicious purposes. Collection of zombie computers is known as ______ or _______.

A
  • Zombies
  • botnet
  • robot network
17
Q

_______ imitate free Wi-Fi networks. They operate close to the legitimate free hotspots and typically provide stronger signals that many users unsuspectingly connect to.

A

Rogue Wi-Fi hotspots

18
Q

_________ contain viruses and other malicious software. Are typically left in public spaces in hope others will find and plug them in.

A

Infected USB flash drives

19
Q

_________ makes it a crime for unauthorized persons even to view- let alone copy or damage - data using any computer across state lines.

A

Computer Fraud and Abuse Act

20
Q

___________ security experts are constantly devising ways to protect computer systems from access by unauthorized persons. Most common way to restrict access is with _________.

A
  • Restricting Access
  • passwords
21
Q

A ________ uses software to try thousands of common words sequentially to gain unauthorized access to a users account.

A

dictionary attack

22
Q

___________ accepts a series of gestures over a picture of the users choice to gain access. other times _______ such as fingerprint and iris scanner is used to restrict data. (ex: facial recognition)

A
  • picture password
  • biometric scanning
23
Q

_______ provide a collection of utility programs designed to protect your privacy and security while you are on the web.

A

security suites

24
Q

___________ act as a security buffer between a corporations private network and all external networks, including the internet.

A

Firewalls

25
Q

__________ help you create strong passwords.

A

Password managers

26
Q

__________ is the process of ensuring the identity of a user. ________ uses two types of data to verify your identity . _________ uses one type of authentication twice

A
  • Authentication
  • Two-factor authentication
  • Two-step authentication
27
Q

__________ whenever information is sent over a network or stored on a computer system, the possibility of unauthorized access exits.

A

Encrypting data

28
Q

____________ process of coding information to make it unreadable except to those who have a special piece of information known as ________, or simply a _______.

A
  • encryption
  • encryption key
  • key
29
Q

____________: protects e-mail messages as they move across the internet

A

e-mail encryption

30
Q

________: protects sensitive files by encrypting them before they are stored on a hard drive.

A

file encryption

31
Q

__________: secures web transactions, especially financial transactions

A

website encryption

32
Q

___________ is the most widely used internet protocol

A

https (hypertext transfer protocol secure)

33
Q

___________ encrypt connections between company networks and remote users such as workers connecting from home.

A

Virtual private networks (VPNs)

34
Q

____________: restricts access to authorized users on wireless networks. ___________ is the most widely used _________ for home wireless networks.

A
  • Wireless network encryption
  • WPA2 ( Wi-Fi Protected Access)
  • wireless networks
35
Q

__________: Companies ( and even individuals) should prepare themselves for disasters.

A

Anticipating disasters

36
Q

__________ is concerned with protecting hardware from possible human and natural disasters.

A

physical security

37
Q

_________ is concerned with protecting software and data from unauthorized tampering or damage

A

data security

38
Q

Most large organization have __________ describing ways to continue operating until normal computer operations can be restored

A

disaster recovery plans

39
Q

________: routinely copy data and store it at a remote location

A

preventing data loss