unit 09: Threats to your digital assets Flashcards

1
Q

identity theft?

A

when a thief steals personal info and poses as you in financial or legal transactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

hacker?

A

anyone who unlawfully breaks a computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

3 types of hackers?

A
  1. white-hat hackers/ethical hacker - hacks to find system vulnerability
  2. grey-hat hacker - illegally hack a computer system to flaunt expertise but is harmless
  3. black-hat hackers - break computer systems to destroy/take illegal info
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

sniffer/packet analyzer?

A

program deployed by hackers to examine each packet and read its content

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

packet?

A

what data travels in when going through the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

trojan horse?

A

a program that appears to be something useful/wanted while running something malicious int eh background

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

backdoor program?

A

gives hackers full access to someone’s computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

rootkit?

A

a program that gives an outsider remote control over a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

zombie?

A

a computer that a hacker controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DoS attack?

A

denial-of-service attack - when legitimate users are denied access to a computer system due to it being zombified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DDoS attack?

A

distributed denial-of-service attack - the distribution of DoS attacks from multiple Zombies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

botnet?

A

a large group of devices that have been infected by robots/bots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

robots/bots

A

software programs that run autonomously

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

exploit kits?

A

software programs that run on servers and search for vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

logical ports?

A

virtual communication paths that allow computers to organize requests for info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

virus?

A

a program that attaches itself to a host program and attempts to spread to another computer through file exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

host program?

A

the program that a virus first attaches to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

what does a virus do?

A

replicates itself and copies its code into files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

is a virus a major threat?

A

no, but they slow down performances and display annoying messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

can Apple devices be affected by viruses?

A

yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

virus symptoms (6)

A
  1. sudden disappearance of icons/files
  2. takes you to places you don’t want to go
  3. odd pop-ups
  4. corrupted files
  5. program stop working properly
  6. system shuts down unexpectantly
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

boot-sector virus?

A

replicates itself onto a hard drive’s master boot record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

master boot record?

A

a program that executes whenever a computer boots up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Logic bomb?

A

a virus that is triggered when a certain logical condition is met (like opening a file)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

time bomb?

A

a virus that is triggered by the passage of time or on a certain date

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

worm?

A

an infection that is independent of a host and uses file transportation or network connection to spread

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

difference between worm and virus

A

worms don’t require a host to spread

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

script?

A

a mini-program that is executed without users knowledge - meant to collect personal info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

macro virus?

A

a virus that attaches to docs that use macros

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Melissa virus?

A

first major macro virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

macro?

A

short series of commands that usually automates repetitive tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

email virus?

A

a virus that uses the address book in emails to spread

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

encryption virus/ransomware?

A

runs a program that searches for common file types holding them hostage asking for a ransom to unlock them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

polymorphic virus?

A

changes its own code to avoid detection - master of disguise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

multi-partite virus?

A

infect multiple file types to confuse antivirus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

stealth virus?

A

temporarily erases code from file - assassin

37
Q

malware?

A

software that has malicious intent

38
Q

3 types of malware

A
  1. adware
  2. spyware
  3. viruses
39
Q

adware?

A

malware that uses ads

40
Q

spyware?

A

malware that is piggybacks other programs you install then runs in the background

41
Q

keystroke logger/keylogger?

A

monitor keystroke with intent to steal codes

42
Q

antispyware?

A

software that detects unwanted programs allowing you to delete them easily

43
Q

spam?

A

unwanted email

44
Q

spam filter?

A

a program that puts suspected spam messages into spam folder/junk mail

45
Q

how much spam is caught by spam filters

A

up to 95%

46
Q

cookies?

A

small text files that some sites automatically store on users hard drive when you visit the site

47
Q

what are cookies used for?

A

gives companies info about site traffic control and effectiveness of marketing strategy

48
Q

can cookies get personal info

A

no

49
Q

social engineering?

A

a technique that uses social skills to generate human interaction in order to get them to reveal sensitive info

50
Q

pretexting?

A

the act of creating a seemingly legitimate scenario to get the users to trust to get sensitive info

51
Q

phishing?

A

lures internet users to reveal personal info leading to identity theft

52
Q

pharming?

A

when malicious code is planted on a users computer which alters the browsers ability to find web addresses leading them to fake web addresses

53
Q

scareware?

A

malware that tries to convince users that the computer is infected getting them to press a pop-up link which proceeds to spread the virus

54
Q

data breach?

A

when sensitive info is copied/transmitted/views by unauthorized personnel

55
Q

spear phishing?

A

when the virus send email to customers acting like a certain company

56
Q

firewall?

A

a software program that is designed to protect a computer from hackers

57
Q

personal firewall?

A

firewall designed specifically for home networks

58
Q

which is better software or hardware firewall?

A

they are both equally as good but installing both will ensure max protection

59
Q

2 ways firewalls protect computers?

A
  1. block access to logical ports

2. secure computer’s network address

60
Q

packet filtering?

A

a process where firewalls filter out data packets that are sent to specific logical ports

61
Q

logical port blocking?

A

when firewalls completely refuse urel requests from the internet asking for access to specific ports

62
Q

6 common logical ports?

A
  1. FTP control - file transfer protocol control
  2. telenet - unencrypted text communications
  3. SMTP - simple mail transfer protocol
  4. DNS - domain name system
  5. HTTP - hypertext transfer protocol
  6. HTTPS - HTTP with security
63
Q

NAT?

A

network address translation - a process used by firewalls to assign internal IP addresses on a netowrk

64
Q

antivirus software?

A

software that is designed to detect viruses and protect the computer form them

65
Q

how long is free antivirus software available for typically

A

90 to 180 days

66
Q

virus signature?

A

a portion of the virus code that is unique to a particular computer virus

67
Q

3 way antivirus work

A
  1. detect virus signatures
  2. stop virus execution - quarantines the virus
  3. prevent future infection - inoculates the virus
68
Q

quarantining?

A

when an antivirus places a virus in a secure area of the hard drive so it cannot spread

69
Q

inoculation?

A

when the antivirus records key attributes about computer files and saves them to the hard drive and compares them to current files to detect potential virus infections

70
Q

drive-by download?

A

when malicious sites download harmful software to the user’s computer

71
Q

CAPTCHA?

A

completely automated pubic Turing test to tell computers and humans apart - used to prevent bot activity

72
Q

biometric authentication device?

A

a device that read a unique personal characteristic and converts its pater into digital code - iris/fingerprint

73
Q

5 security measures

A
  1. password
  2. fingerprint
  3. gestures
  4. facial recognition
  5. iris scan
74
Q

milti-factor authentication?

A

when a system requires multiple types of authentication before relaying authroization

75
Q

3 authentication factors?

A
  1. knowledge - password
  2. possession - ID card
  3. inherence - a biometric characteristic
76
Q

VPN?

A

virtual private networks - secure networks that are established using the public internet infrastructure

77
Q

backups?

A

copies of files that can replace the original if damaged/lost

78
Q

2 types of files to back up?

A
  1. program files - installation files for productivity software
  2. data files - created/purchased files
79
Q

2 types of backups

A
  1. full backup - all apps and data files

2. image/system - images of the entire computer and system software

80
Q

3 places to store back up files

A
  1. online - cloud
  2. external hard drive
  3. network-attached storage devices/home servers
81
Q

incremental/partial backups?

A

backing up files that have changed/been created since the last back up

82
Q

which backup should be updated more frequently?

a) full
b) image/system

A

a)

83
Q

how are Apple computers backed up?

A

automatically to an external drive or NAS device

84
Q

surge protector?

A

a device that protects users computers against power surges

85
Q

how often should you replace your surge protector?

A

2 to 3 years/ after a major surge

86
Q

whole-house surge protector?

A

protects all electrical device in the house form power surges

87
Q

UPS?

A

uninterruptible Power Supply - battery backup if the power goes out

88
Q

computer forensics?

A

identifying, extracting, preserving, and documenting computer evidence

89
Q

computer security checklist (4 items)

A
  1. firewall installed
  2. antivirus/antispyware protection installed
  3. frequent software updates
  4. physically protecting the hardware