Security Part 1 Flashcards

1
Q

The protection of computing systems and data from unauthorized access, change or destruction is ?

A

Computer Security
It can be used
Upholding laws : Example : Computer forensics
Breaking the laws : Viruses, Identity theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Any crime using computers or
networks such as :
Billion of dollars are lost and Majority are conducted by company insiders

A

Cyber Crime like
Money , Goods , Information and Software Resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

To repeatedly harm or harass people in a deliberate manner on the internet ?

A

Cyberstalking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Targeting children and young adults online, involves humiliation, rumors, lies, taunts or threats ?

A

Cyber bullying

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Intellectual Property Theft ?

A

Software Piracy
File sharing of copy righted songs
Illegal duplication and distribution of movies
Plagiarism of copy righted text

Getting sensitive data through ? Spoofing and Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Theft of computer itself ?

A

Which Laptops and Smartphones are often stolen

The software and information on the computer are more valuable than the hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Trick that target to extract secret information
Example : Making a phone call and posing as an internet technician is ?

A

Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Is a type of social engineering technique used to obtain information by looking over the victim’s shoulder ?

A

Shoulder surfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Is the act of attempting to acquire
sensitive information by masquerading as a
trustworthy ( pretend to be )
Such as : Sending an email posing as a bank
representative ?

A

phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How to Identity Theft ?

A

Extract personal information to commit a
crime in another person identity
Like National ID , Driving License and Credit card number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How to Identity theft protection ?

A

Use separate credit card for online use
Use secure websites (https://)
Don’t disclose personal info on phone
Handle email with care
Report Identity theft promptly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which is malware used to disrupt computer operation, gather sensitive information, or gain access to private computer systems ?

A

Malicious Software
Like Viruses, Worms , Trojan horses , Spyware
and Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Are attached to a file/program and spread
when files are exchanged via email attachments or flash drive ?

A

Viruses
When the virus program is opened / Executed it happens in a ways of ?
Damages the Operating system , Destroys or steals data and Display annoying pop-up messages

Newer types of Viruses are called Cross platform

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Micro viruses ?

A

Attach themselves to documents containing
macros (a set of commands to automate repetitive tasks)
Such as : MS Office files and Melissa virus (1999)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Worms ?

A

They are independent programs
Capable of reproducing themselves
Causes memory freezes
Has type ?
Famous worm : Code Red (2001)
which attacks internet servers running
Microsoft Servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Disguise themselves as useful programs or apps, but has hidden destructive program (viruses) Example : Time bomb ?

A

Trojan Horse
Which Often posted in shareware , Names sound like games

17
Q

Gets installed and collects information without user’s knowledge ?

A

Spyware called ( Spybot or tracking software )
Has tracks which is ?
Keystrokes , web sites visited and Screen displays

18
Q

It is malware that locks your computer and encrypts data in your hard drive or pay a ransom to unblock the files again ?

A

Ransomware
How do you get infected?
By opening an infected email attachment or malicious link

19
Q

Hacking and Electronic Trespassing ?

A

People who break into computer systems or
networks unlawfully

also it can control computers or steal personal
information to commit identity theft

20
Q

Which are criminals develop new techniques to penetrate systems to gain illegal access or destroy information ?

A

Black- Hat Hacker

21
Q

It is security experts developing new techniques to protect us for non-malicious reasons such as to expose/test the system weaknesses ?

A

White Hat Hacker (Ethical Hacker)

22
Q

Is the Internet connected computers that have been hijacked (To take control) using viruses to perform malicious acts without the knowledge of the owners ?

A

Zombie computers

23
Q

What is Botnets ?

A

Is a group of software programs called bots
which is Run automatically on zombie computers

24
Q

What is DDOS : Distributed Denial of Service ?

A

It’s bombards servers and web sites with traffic that shuts them down which using thousands of zombie computers (botnets)

Authorized users cannot use their computer