Security Flashcards

1
Q

To protect ourselves from threats, computer ______ needs to protect our information, hardware, and software from unauthorized use, as well as preventing or limiting damage from intrusions, sabotage, and natural disasters.

A

security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

_________ or ________ is any criminal offense that involves a computer and a network. Often in news _________ which is a politically motivated cybercrime.

A
  • cybercrime
  • computer crime
  • cyberterrorism
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

_______ is the illegal assumption of someone’s identity for the purposes of economic gain.

A

Identity theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

________ scams using the Internet. Have created financial and legal problems for many thousands of people.

A

Internet scams

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

______ is the unauthorized access of a computer network and copying files to or from the server.

A

Data manipulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

_________ is a malicious software that encrypts your computers data and ransoms the password to the user.

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

_________ attempt to slow down or stop a computer system or network by flooding a computer or network with requests for information and data.

A

Denial of Service (DoS) attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Widely used today is a variation known as _________, which coordinates several computers making repeated requests for service

A

distributed denial of service (DDoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

_________ is the practice of manipulation people to divulge private data.

A

social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

One of the most common social engineering techniques is _______. Attempts to trick Internet users into thinking a fake but official-looking website or e-mail is legitimate.

A

phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A _______ is a computer criminal who creates and distributes malicious programs or _____, which is short for _______.

A
  • cracker
  • malware
  • malicious software
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Three most common types of malware are:

A
  1. Viruses
  2. Worms
  3. Trojan Horses
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

________ are programs that migrate through networks and operating systems, and mostly attach themselves to other programs and databases.

A

Viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

______ are programs that simply replicate themselves over and over again.

A

Worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

_______ are programs that appear to be harmless but contain malicious programs. Not viruses but can be carriers of viruses.

A

trojan horses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

______ are computers infected by a virus, worm , or trojan horse that allows them to be remotely controlled for malicious purposes. Collection of zombie computers is known as ______ or _______.

A
  • Zombies
  • botnet
  • robot network
17
Q

_______ imitate free Wi-Fi networks. They operate close to the legitimate free hotspots and typically provide stronger signals that many users unsuspectingly connect to.

A

Rogue Wi-Fi hotspots

18
Q

_________ contain viruses and other malicious software. Are typically left in public spaces in hope others will find and plug them in.

A

Infected USB flash drives

19
Q

_________ makes it a crime for unauthorized persons even to view- let alone copy or damage - data using any computer across state lines.

A

Computer Fraud and Abuse Act

20
Q

___________ security experts are constantly devising ways to protect computer systems from access by unauthorized persons. Most common way to restrict access is with _________.

A
  • Restricting Access
  • passwords
21
Q

A ________ uses software to try thousands of common words sequentially to gain unauthorized access to a users account.

A

dictionary attack

22
Q

___________ accepts a series of gestures over a picture of the users choice to gain access. other times _______ such as fingerprint and iris scanner is used to restrict data. (ex: facial recognition)

A
  • picture password
  • biometric scanning
23
Q

_______ provide a collection of utility programs designed to protect your privacy and security while you are on the web.

A

security suites

24
Q

___________ act as a security buffer between a corporations private network and all external networks, including the internet.

25
__________ help you create strong passwords.
Password managers
26
__________ is the process of ensuring the identity of a user. ________ uses two types of data to verify your identity . _________ uses one type of authentication twice
- Authentication - Two-factor authentication - Two-step authentication
27
__________ whenever information is sent over a network or stored on a computer system, the possibility of unauthorized access exits.
Encrypting data
28
____________ process of coding information to make it unreadable except to those who have a special piece of information known as ________, or simply a _______.
- encryption - encryption key - key
29
____________: protects e-mail messages as they move across the internet
e-mail encryption
30
________: protects sensitive files by encrypting them before they are stored on a hard drive.
file encryption
31
__________: secures web transactions, especially financial transactions
website encryption
32
___________ is the most widely used internet protocol
https (hypertext transfer protocol secure)
33
___________ encrypt connections between company networks and remote users such as workers connecting from home.
Virtual private networks (VPNs)
34
____________: restricts access to authorized users on wireless networks. ___________ is the most widely used _________ for home wireless networks.
- Wireless network encryption - WPA2 ( Wi-Fi Protected Access) - wireless networks
35
__________: Companies ( and even individuals) should prepare themselves for disasters.
Anticipating disasters
36
__________ is concerned with protecting hardware from possible human and natural disasters.
physical security
37
_________ is concerned with protecting software and data from unauthorized tampering or damage
data security
38
Most large organization have __________ describing ways to continue operating until normal computer operations can be restored
disaster recovery plans
39
________: routinely copy data and store it at a remote location
preventing data loss