Topic 7: Computer and Society Flashcards

1
Q

Define digital security risk

A

event of act that cause loss or damage of computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define computer crime

A

illegal act using computer or related device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define cybercrime

A

online or Internet-based illegal activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

examples of risk

A
  • hacker
  • cracker
  • script kiddie
  • cyberterrorist
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define malware (malicious software)

A

consist of program that act without user’s knowledge and alter the operation of computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

trojan horse, virus and worm

A

trojan horse:
- hide in or looks like a legitimate program
- do not replicate itself

Virus:
- alter the way computer works
- infect the computer

Worm:
- copies itself repeatedly in memory and storage
- using up the resources
- cause the shutting down of computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define botnet

A

a group of compromised computer (zombie) or mobile device connected to a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Dos attack (Daniel of Service Attack)

A
  • meant to shutting down a networks
  • disrupt computer to access the networks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Spoofing

A

intruders used to make their transmission appear legitimate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

back door

A

a program to bypass security control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Unauthorized access and Unauthorized use

A

unauthorized access: use of computer or internet without permission
unauthorized use: using computer or internet to do illegal activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

2 measure to prevent unauthorized access and use

A
  1. acceptable use policy
  2. disable file and printer sharing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Biometric device

A

used to verify a personal identity by translating personal characteristic into digital code and compared it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

examples of biometric device

A
  • face recognizing system
  • fingerprint reader
  • voice verification system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Digital forensic

A

discovery, collection and analysis of evidence on a computer or internet
- military
- information security
- criminal
- insurance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

define encryption

A

process of converting readable data into encoded character to prevent unauthorized access

17
Q

examples of encryption

A
  • public and private key
  • digital signature
  • digital certificate
18
Q

types of back up

A
  • full
  • differential
  • selection
  • cloud
19
Q

risk of wireless access

A
  • gain free internet access
  • gain confidential data
20
Q

safeguards

A
  • install firewall
  • fill in only necessary information
  • browse internet anonymously
  • do not reply spam email
21
Q

security technique to access control

A
  • PIN (Personal Identification Number)
  • password
  • biometric device
  • physical key and card