unit 09: Threats to your digital assets Flashcards
identity theft?
when a thief steals personal info and poses as you in financial or legal transactions
hacker?
anyone who unlawfully breaks a computer system
3 types of hackers?
- white-hat hackers/ethical hacker - hacks to find system vulnerability
- grey-hat hacker - illegally hack a computer system to flaunt expertise but is harmless
- black-hat hackers - break computer systems to destroy/take illegal info
sniffer/packet analyzer?
program deployed by hackers to examine each packet and read its content
packet?
what data travels in when going through the internet
trojan horse?
a program that appears to be something useful/wanted while running something malicious int eh background
backdoor program?
gives hackers full access to someone’s computer
rootkit?
a program that gives an outsider remote control over a computer
zombie?
a computer that a hacker controls
DoS attack?
denial-of-service attack - when legitimate users are denied access to a computer system due to it being zombified
DDoS attack?
distributed denial-of-service attack - the distribution of DoS attacks from multiple Zombies
botnet?
a large group of devices that have been infected by robots/bots
robots/bots
software programs that run autonomously
exploit kits?
software programs that run on servers and search for vulnerabilities
logical ports?
virtual communication paths that allow computers to organize requests for info
virus?
a program that attaches itself to a host program and attempts to spread to another computer through file exchange
host program?
the program that a virus first attaches to
what does a virus do?
replicates itself and copies its code into files
is a virus a major threat?
no, but they slow down performances and display annoying messages
can Apple devices be affected by viruses?
yes
virus symptoms (6)
- sudden disappearance of icons/files
- takes you to places you don’t want to go
- odd pop-ups
- corrupted files
- program stop working properly
- system shuts down unexpectantly
boot-sector virus?
replicates itself onto a hard drive’s master boot record
master boot record?
a program that executes whenever a computer boots up
Logic bomb?
a virus that is triggered when a certain logical condition is met (like opening a file)
time bomb?
a virus that is triggered by the passage of time or on a certain date
worm?
an infection that is independent of a host and uses file transportation or network connection to spread
difference between worm and virus
worms don’t require a host to spread
script?
a mini-program that is executed without users knowledge - meant to collect personal info
macro virus?
a virus that attaches to docs that use macros
Melissa virus?
first major macro virus
macro?
short series of commands that usually automates repetitive tasks
email virus?
a virus that uses the address book in emails to spread
encryption virus/ransomware?
runs a program that searches for common file types holding them hostage asking for a ransom to unlock them
polymorphic virus?
changes its own code to avoid detection - master of disguise
multi-partite virus?
infect multiple file types to confuse antivirus
stealth virus?
temporarily erases code from file - assassin
malware?
software that has malicious intent
3 types of malware
- adware
- spyware
- viruses
adware?
malware that uses ads
spyware?
malware that is piggybacks other programs you install then runs in the background
keystroke logger/keylogger?
monitor keystroke with intent to steal codes
antispyware?
software that detects unwanted programs allowing you to delete them easily
spam?
unwanted email
spam filter?
a program that puts suspected spam messages into spam folder/junk mail
how much spam is caught by spam filters
up to 95%
cookies?
small text files that some sites automatically store on users hard drive when you visit the site
what are cookies used for?
gives companies info about site traffic control and effectiveness of marketing strategy
can cookies get personal info
no
social engineering?
a technique that uses social skills to generate human interaction in order to get them to reveal sensitive info
pretexting?
the act of creating a seemingly legitimate scenario to get the users to trust to get sensitive info
phishing?
lures internet users to reveal personal info leading to identity theft
pharming?
when malicious code is planted on a users computer which alters the browsers ability to find web addresses leading them to fake web addresses
scareware?
malware that tries to convince users that the computer is infected getting them to press a pop-up link which proceeds to spread the virus
data breach?
when sensitive info is copied/transmitted/views by unauthorized personnel
spear phishing?
when the virus send email to customers acting like a certain company
firewall?
a software program that is designed to protect a computer from hackers
personal firewall?
firewall designed specifically for home networks
which is better software or hardware firewall?
they are both equally as good but installing both will ensure max protection
2 ways firewalls protect computers?
- block access to logical ports
2. secure computer’s network address
packet filtering?
a process where firewalls filter out data packets that are sent to specific logical ports
logical port blocking?
when firewalls completely refuse urel requests from the internet asking for access to specific ports
6 common logical ports?
- FTP control - file transfer protocol control
- telenet - unencrypted text communications
- SMTP - simple mail transfer protocol
- DNS - domain name system
- HTTP - hypertext transfer protocol
- HTTPS - HTTP with security
NAT?
network address translation - a process used by firewalls to assign internal IP addresses on a netowrk
antivirus software?
software that is designed to detect viruses and protect the computer form them
how long is free antivirus software available for typically
90 to 180 days
virus signature?
a portion of the virus code that is unique to a particular computer virus
3 way antivirus work
- detect virus signatures
- stop virus execution - quarantines the virus
- prevent future infection - inoculates the virus
quarantining?
when an antivirus places a virus in a secure area of the hard drive so it cannot spread
inoculation?
when the antivirus records key attributes about computer files and saves them to the hard drive and compares them to current files to detect potential virus infections
drive-by download?
when malicious sites download harmful software to the user’s computer
CAPTCHA?
completely automated pubic Turing test to tell computers and humans apart - used to prevent bot activity
biometric authentication device?
a device that read a unique personal characteristic and converts its pater into digital code - iris/fingerprint
5 security measures
- password
- fingerprint
- gestures
- facial recognition
- iris scan
milti-factor authentication?
when a system requires multiple types of authentication before relaying authroization
3 authentication factors?
- knowledge - password
- possession - ID card
- inherence - a biometric characteristic
VPN?
virtual private networks - secure networks that are established using the public internet infrastructure
backups?
copies of files that can replace the original if damaged/lost
2 types of files to back up?
- program files - installation files for productivity software
- data files - created/purchased files
2 types of backups
- full backup - all apps and data files
2. image/system - images of the entire computer and system software
3 places to store back up files
- online - cloud
- external hard drive
- network-attached storage devices/home servers
incremental/partial backups?
backing up files that have changed/been created since the last back up
which backup should be updated more frequently?
a) full
b) image/system
a)
how are Apple computers backed up?
automatically to an external drive or NAS device
surge protector?
a device that protects users computers against power surges
how often should you replace your surge protector?
2 to 3 years/ after a major surge
whole-house surge protector?
protects all electrical device in the house form power surges
UPS?
uninterruptible Power Supply - battery backup if the power goes out
computer forensics?
identifying, extracting, preserving, and documenting computer evidence
computer security checklist (4 items)
- firewall installed
- antivirus/antispyware protection installed
- frequent software updates
- physically protecting the hardware