Security Part 1 Flashcards
Computer Security ?
The protection of computing systems and data
from unauthorized access, change or destruction
It can be used
Upholding laws : Example : Computer forensics
Breaking the laws : Viruses, Identity theft
what are types of Computer Crime ?
Cyber Crime : Any crime using computers or
networks such as :
Billion of dollars are lost and Majority are conducted by company insiders
Cyber Stalking : To repeatedly harm or harass people in a deliberate manner on the internet
To help yourself - limit how much personal
info you share
Cyber bullying : Targeting children and young adults online, involves humiliation, rumors, lies, taunts or threats
what is Intellectual Property Theft ?
Software Piracy
File sharing of copy righted songs
Illegal duplication and distribution of movies
Plagiarism of copy righted text
What is stolen ?
Money , Goods , Information and Software Resources
Getting sensitive data through ? Spoofing and Phishing
Theft of computer itself ?
Laptops and Smartphones are often stolen
The software and information on the computer are more valuable than the hardware
what are the 3 types of Social Engineering ?
Spoofing : Trick that target to extract secret information
Example : Making a phone call and posing as an internet technician
Shoulder surfing : Is a type of social engineering technique used to obtain
information by looking over the victim’s shoulder
Example :Passwords and other confidential data
Phishing : Is the act of attempting to acquire
sensitive information by masquerading as a
trustworthy ( pretend to be )
Such as : Sending an email posing as a bank
representative
How to Identity Theft ?
Extract personal information to commit a
crime in another person identity
Like National ID , Driving License and Credit card number
How to Identity theft protection ?
Use separate credit card for online use
Use secure websites (https://)
Don’t disclose personal info on phone
Handle email with care
Report Identity theft promptly
Software Sabotage ?
Malicious Software : Which is malware used to disrupt computer operation, gather sensitive information, or gain access to private computer systems
Like Viruses, Worms , Trojan horses , Spyware
and Ransomware
Viruses ?
Are attached to a file/program and spread
when files are exchanged via email attachments or flash drive
When the virus program is opened / Executed it happens in a ways of ?
Damages the Operating system , Destroys or steals data and Display annoying pop-up messages
Newer types of Viruses are called Cross platform
What is Micro viruses ?
Attach themselves to documents containing
macros (a set of commands to automate repetitive tasks)
Such as : MS Office files and Melissa virus (1999)
Worms ?
They are independent programs
Capable of reproducing themselves
Causes memory freezes
Has type ?
Famous worm : Code Red (2001)
which attacks internet servers running
Microsoft Servers
Trojan Horse ?
Disguise themselves as useful programs or apps, but has hidden destructive program (viruses) Example : Time bomb
Which Often posted in shareware , Names sound like games or utilities and Act as a backdoor allowing the attacker to control your PC
Spyware ?
Gets installed and collects information without
user’s knowledge which called Spybot or tracking software
Has tracks which is ?
Keystrokes , web sites visited and Screen displays
What is Ransomware ?
It is malware that locks your computer and encrypts data in your hard drive
Demands that you pay a ransom to unblock the files again
How do you get infected?
By opening an infected email attachment or malicious link
Attackers usually ask you to pay the ransom using digital currencies, such as Bitcoin
Hacking and Electronic Trespassing ?
People who break into computer systems or
networks unlawfully
also it can control computers or steal personal
information to commit identity theft