Security Flashcards
What is a code that runs on a computer without the users knowledge; it infects the computer when the code is accessed and executed?
Virus
What is similar to viruses except that it self replicates whereas a virus does not?
Worm
What appears to perform a desired functions but are actually performing malicious functions behind the scenes?
Trojan horse
What malicious software either downloaded unwittingly from a website or installed along with some other third-party software?
Spyware
What software designed to gain administrator local control over a computer system without being detected?
Rootkit
What is the abuse of electronic messaging system such as email, broadcast media, and instant messaging?
Spam
Some ways to prevent and troubleshoot viruses are:
Antivirus software. Update the antivirus software. Make sure the computer has the latest service packs and updates. Run Windows Update. Make sure a firewall is enabled and up to date.
You should also disable Autorun for CD, DVD, and Blu-ray.
To disable AutoRun in Windows 7:
Click Start and type gpedit.msc
Go to Computer Configuration > Administrative Templates > Windows Components > Autoplay Policies
Double click the Turn Off Autoplay setting. Click Enabled radio button and click OK.
Some symptoms of viruses are:
Computer runs slower than usual. Computer locks up frequently. Computer restarts on its own or crashes frequently. Strange sounds occur. Antivirus programs won't run.
If a system is infected with a virus:
Disconnect the network cable from the computer. Make sure you back up critical data. Run a thorough scan with the antivirus program.
Preventing and troubleshooting Spyware:
Download and install anti-spyware protection software.
Adjust Internet Explorer security settings.
Turn on the Phishing filter in IE.
Uninstall unnecessary application’s.
Educate users on how to surf the web safely.
Consider technologies that discourage spyware.
Some symptoms of spyware are:
The web browser’s default homepage has been modified.
A particular website comes up every time you perform search.
Excessive pop up windows appear.
The network adapter’s activity LED blinks frequently even when the computer is not transmitting data.
To repair Spyware:
First disconnect the system from the Internet.
Then try uninstalling the program from Control Panel > Programs and Features in Windows 7/Vista, and Add/Remove Programs in XP.
Then reboot the computer.
You can use HijackThis program.
Preventing and troubleshooting rootkits:
The best way to identify root kit is to use removable media to boot the computer. Reinstall all software.
Preventing and troubleshooting spam:
Use a strong password.
Use a spam filter.
Use whitelists and blacklists.
Train your users.
What is access to an organization’s premises, computer resources and date out without consent of the owner?
Unauthorized access
Unauthorized access can be prevented through the use of authentication.
Something that the user knows, for example, a password or PIN.
Something that user has, for example a smart card or other security token.
Something that user is, for example the biometric reading of a fingerprint or retina scan.
Something that user does, for example a signature or speaking words.
You should always lock rooms and closets and you can even lock PCs and laptops.
Configure the BIOS to lock whether someone opened the case of the computer.
This is logged as chassis intrusion.
What is software designed to infiltrate a computer system and possibly damage it without the user’s knowledge or consent?
Malware
The most common electronic entry system is the card key system.
Other electronic systems will use key towards incorporate a photo ID, or magnetic stripe, barcode, or a radio frequency identification chip (RFID).
Some organizations will design what is known as a mantrap, an area with two locking doors.
What is the science of recognizing humans based on one or more physical characteristics?
Biometrics
An example of biometric hardware is the Microsoft Fingerprint Scanner.
Protecting data physically:
Password should not be written down and not left on the desk or taped to a monitor.
Users should lock their computers when they leave their workstation.
What is the act of manipulating users into revealing confidential information or performing other actions detrimental to the user?
Social engineering
What is the attempt at fraudulently obtaining private information?
Phishing
An example of phishing would be an email that requests verification of private information.