Security Part 1 Flashcards

1
Q

Computer Security ?

A

The protection of computing systems and data
from unauthorized access, change or destruction
It can be used
Upholding laws : Example : Computer forensics
Breaking the laws : Viruses, Identity theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what are types of Computer Crime ?

A

Cyber Crime : Any crime using computers or
networks such as :
Billion of dollars are lost and Majority are conducted by company insiders

Cyber Stalking : To repeatedly harm or harass people in a deliberate manner on the internet
To help yourself - limit how much personal
info you share

Cyber bullying : Targeting children and young adults online, involves humiliation, rumors, lies, taunts or threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is Intellectual Property Theft ?

A

Software Piracy
File sharing of copy righted songs
Illegal duplication and distribution of movies
Plagiarism of copy righted text

What is stolen ?
Money , Goods , Information and Software Resources

Getting sensitive data through ? Spoofing and Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Theft of computer itself ?

A

Laptops and Smartphones are often stolen

The software and information on the computer are more valuable than the hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what are the 3 types of Social Engineering ?

A

Spoofing : Trick that target to extract secret information
Example : Making a phone call and posing as an internet technician

Shoulder surfing : Is a type of social engineering technique used to obtain
information by looking over the victim’s shoulder
Example :Passwords and other confidential data

Phishing : Is the act of attempting to acquire
sensitive information by masquerading as a
trustworthy ( pretend to be )
Such as : Sending an email posing as a bank
representative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How to Identity Theft ?

A

Extract personal information to commit a
crime in another person identity
Like National ID , Driving License and Credit card number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How to Identity theft protection ?

A

Use separate credit card for online use
Use secure websites (https://)
Don’t disclose personal info on phone
Handle email with care
Report Identity theft promptly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Software Sabotage ?

A

Malicious Software : Which is malware used to disrupt computer operation, gather sensitive information, or gain access to private computer systems
Like Viruses, Worms , Trojan horses , Spyware
and Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Viruses ?

A

Are attached to a file/program and spread
when files are exchanged via email attachments or flash drive

When the virus program is opened / Executed it happens in a ways of ?
Damages the Operating system , Destroys or steals data and Display annoying pop-up messages

Newer types of Viruses are called Cross platform

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Micro viruses ?

A

Attach themselves to documents containing
macros (a set of commands to automate repetitive tasks)
Such as : MS Office files and Melissa virus (1999)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Worms ?

A

They are independent programs
Capable of reproducing themselves
Causes memory freezes
Has type ?
Famous worm : Code Red (2001)
which attacks internet servers running
Microsoft Servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Trojan Horse ?

A

Disguise themselves as useful programs or apps, but has hidden destructive program (viruses) Example : Time bomb

Which Often posted in shareware , Names sound like games or utilities and Act as a backdoor allowing the attacker to control your PC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Spyware ?

A

Gets installed and collects information without
user’s knowledge which called Spybot or tracking software
Has tracks which is ?
Keystrokes , web sites visited and Screen displays

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Ransomware ?

A

It is malware that locks your computer and encrypts data in your hard drive
Demands that you pay a ransom to unblock the files again
How do you get infected?
By opening an infected email attachment or malicious link

Attackers usually ask you to pay the ransom using digital currencies, such as Bitcoin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Hacking and Electronic Trespassing ?

A

People who break into computer systems or
networks unlawfully

also it can control computers or steal personal
information to commit identity theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the types of Hackers ?

A

Black- Hat Hacker : Which are criminals develop new techniques to penetrate systems to gain illegal access or destroy information

White Hat Hacker (Ethical Hacker) :
It is security experts developing new techniques to protect us for non-malicious reasons such as to expose/test the system weaknesses

Zombie Computers : Is the Internet connected computers that have been hijacked (To take control) using viruses to perform malicious acts without the knowledge of the owners

17
Q

What is Botnets ?

A

Is a group of software programs called bots
which is Run automatically on zombie computers

18
Q

What is DDOS : Distributed Denial of Service ?

A

It’s bombards servers and web sites with traffic that shuts them down -> using thousands of zombie computers (botnets)

Authorized users cannot use their computer