Security Part 1 Flashcards
The protection of computing systems and data from unauthorized access, change or destruction is ?
Computer Security
It can be used
Upholding laws : Example : Computer forensics
Breaking the laws : Viruses, Identity theft
Any crime using computers or
networks such as :
Billion of dollars are lost and Majority are conducted by company insiders
Cyber Crime like
Money , Goods , Information and Software Resources
To repeatedly harm or harass people in a deliberate manner on the internet ?
Cyberstalking
Targeting children and young adults online, involves humiliation, rumors, lies, taunts or threats ?
Cyber bullying
What is Intellectual Property Theft ?
Software Piracy
File sharing of copy righted songs
Illegal duplication and distribution of movies
Plagiarism of copy righted text
Getting sensitive data through ? Spoofing and Phishing
Theft of computer itself ?
Which Laptops and Smartphones are often stolen
The software and information on the computer are more valuable than the hardware
Trick that target to extract secret information
Example : Making a phone call and posing as an internet technician is ?
Spoofing
Is a type of social engineering technique used to obtain information by looking over the victim’s shoulder ?
Shoulder surfing
Is the act of attempting to acquire
sensitive information by masquerading as a
trustworthy ( pretend to be )
Such as : Sending an email posing as a bank
representative ?
phishing
How to Identity Theft ?
Extract personal information to commit a
crime in another person identity
Like National ID , Driving License and Credit card number
How to Identity theft protection ?
Use separate credit card for online use
Use secure websites (https://)
Don’t disclose personal info on phone
Handle email with care
Report Identity theft promptly
Which is malware used to disrupt computer operation, gather sensitive information, or gain access to private computer systems ?
Malicious Software
Like Viruses, Worms , Trojan horses , Spyware
and Ransomware
Are attached to a file/program and spread
when files are exchanged via email attachments or flash drive ?
Viruses
When the virus program is opened / Executed it happens in a ways of ?
Damages the Operating system , Destroys or steals data and Display annoying pop-up messages
Newer types of Viruses are called Cross platform
What is Micro viruses ?
Attach themselves to documents containing
macros (a set of commands to automate repetitive tasks)
Such as : MS Office files and Melissa virus (1999)
Worms ?
They are independent programs
Capable of reproducing themselves
Causes memory freezes
Has type ?
Famous worm : Code Red (2001)
which attacks internet servers running
Microsoft Servers