Security Flashcards
To protect ourselves from threats, computer ______ needs to protect our information, hardware, and software from unauthorized use, as well as preventing or limiting damage from intrusions, sabotage, and natural disasters.
security
_________ or ________ is any criminal offense that involves a computer and a network. Often in news _________ which is a politically motivated cybercrime.
- cybercrime
- computer crime
- cyberterrorism
_______ is the illegal assumption of someone’s identity for the purposes of economic gain.
Identity theft
________ scams using the Internet. Have created financial and legal problems for many thousands of people.
Internet scams
______ is the unauthorized access of a computer network and copying files to or from the server.
Data manipulation
_________ is a malicious software that encrypts your computers data and ransoms the password to the user.
Ransomware
_________ attempt to slow down or stop a computer system or network by flooding a computer or network with requests for information and data.
Denial of Service (DoS) attacks
Widely used today is a variation known as _________, which coordinates several computers making repeated requests for service
distributed denial of service (DDoS)
_________ is the practice of manipulation people to divulge private data.
social engineering
One of the most common social engineering techniques is _______. Attempts to trick Internet users into thinking a fake but official-looking website or e-mail is legitimate.
phishing
A _______ is a computer criminal who creates and distributes malicious programs or _____, which is short for _______.
- cracker
- malware
- malicious software
Three most common types of malware are:
- Viruses
- Worms
- Trojan Horses
________ are programs that migrate through networks and operating systems, and mostly attach themselves to other programs and databases.
Viruses
______ are programs that simply replicate themselves over and over again.
Worms
_______ are programs that appear to be harmless but contain malicious programs. Not viruses but can be carriers of viruses.
trojan horses