Unit 7 – Security Flashcards
```
~~~
When personal information such as name, address, SIN, birth date, bank account numbers, and credit card information is stolen
Can occur in-person or via computer
Identity Theft
A person who unlawfully breaks into a computer system
Hacker
Ethical hackers, break into system to test and find vulnerabilities so they can be parched → “good guys”
White-Hat Hackers:
Break into system to destroy things or for illegal gain → “bad guys”
Black-Hat Hackers
Grey-Hat Hackers
Illegally break into systems to expose flaws, gain attention, show expertise, or
sell security repair service
Malicious computer program that attaches itself to another program and tries to spread when files are shared between 2 computers
Can cause programs and files to: disappear, change home pages, show strange messages, popup, play music/odd sounds, corrupt data, make programs not function, shut down your system unexpectedly
Virus
Changes its own code to avoid detection
Polymorphic Virus
Many parasites → designed to infect many files, making it harder to find
Multipartite Virus
Temporarily erases code from their files and hides it in active memory
Stealth Virus:
Targets the Master Boot Record so that your computer loads it every time it starts → during start up, virus gets loaded on computer’s memory
Boot-Sector Viruses
execute when logical conditions are met (Example: opening a file, perform an action)
Logic bombs:
execute at a set date or time
Time bombs:
Transport themselves through networks/emails and spread on their own → usually generates lots of data traffic (slows down Internet)
Worm
Several commands that execute without your knowledge, often used to collect personal information
Script
Attaches itself to document that uses macros (Example: Excel)
Macro Virus
Distribute viruses to a person’s friend by attaching itself to their contact list
Email Viruses