Unit 7 – Security Flashcards

1
Q

```

~~~

When personal information such as name, address, SIN, birth date, bank account numbers, and credit card information is stolen
 Can occur in-person or via computer

A

Identity Theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A person who unlawfully breaks into a computer system

A

Hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Ethical hackers, break into system to test and find vulnerabilities so they can be parched → “good guys”

A

 White-Hat Hackers:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Break into system to destroy things or for illegal gain → “bad guys”

A

Black-Hat Hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Grey-Hat Hackers

A

Illegally break into systems to expose flaws, gain attention, show expertise, or
sell security repair service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Malicious computer program that attaches itself to another program and tries to spread when files are shared between 2 computers
 Can cause programs and files to: disappear, change home pages, show strange messages, popup, play music/odd sounds, corrupt data, make programs not function, shut down your system unexpectedly

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Changes its own code to avoid detection

A

Polymorphic Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Many parasites → designed to infect many files, making it harder to find

A

Multipartite Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Temporarily erases code from their files and hides it in active memory

A

Stealth Virus:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Targets the Master Boot Record so that your computer loads it every time it starts → during start up, virus gets loaded on computer’s memory

A

Boot-Sector Viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

execute when logical conditions are met (Example: opening a file, perform an action)

A

Logic bombs:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

execute at a set date or time

A

Time bombs:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Transport themselves through networks/emails and spread on their own → usually generates lots of data traffic (slows down Internet)

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Several commands that execute without your knowledge, often used to collect personal information

A

Script

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Attaches itself to document that uses macros (Example: Excel)

A

Macro Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Distribute viruses to a person’s friend by attaching itself to their contact list

A

Email Viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Ransomware – makes programs unusable and asks for money to decrypt them

A

Encryption Virus

18
Q

Software that has malicious intents.

A

Malware

19
Q

3 types OF Malware

Software that displays ads

A

Adware

20
Q

3 types OF Malware

Unwanted background program → transmits personal
information, habits and tracks cookies

A

Spyware

21
Q

3 types OF Malware

A

Viruses

22
Q

Unsolicited emails vs. Unsolicited instant messages

A

Spam vs. Spim:

23
Q

Small text files stored automatically on your hard drive by websites you visit so they can track visits, ads, online forms you fill in, etc.

A

Cookies:

24
Q

When files are automatically downloaded to your file when you visit a website (1 in 1000 websites have this issue according to Google)

A

Drive-by Download:

25
Q

Using social skills to obtain sensitive information (Example: telephone scams)

A

Social Engineering:

26
Q

Creating a scenario where the person sounds legitimate so you trust them and give them information

A

Pretexting

27
Q

Pretexting done in cyberspace (Example: email stating to update/confirm an account information)

A

Phishing

28
Q

Programs that direct users to fake sites when they enter a legit one

A

Pharming

29
Q

Makes popups, banners and other messages telling you your computer is infected
(Example: directing to website selling fake removal antivirus tools)

A

Scareware

30
Q

Program that closes logical ports (used by hackers) to prevent unwanted access to your computer → blocks access to logical ports AND keep computer’s network address secure

A

Firewall

31
Q

Firewall

Process by which firewalls monitor incoming and outgoing packets and filter out packets sent to specific logical ports

A

Packet Filtering:

32
Q

Firewall

Process where firewalls can be configured to ignore requests originating from Internet asking to access certain ports

A

Logical Port Blocking:

33
Q

Firewall

Process used by firewalls to assign internal IP address on network → can’t be detected by hackers (even when they know your public IP address)
o Internet Protocol Address (IP Address): every computer connected to Internet has unique address assigned to router by Internet Service Provider (ISP)

A

Network Address Translation (NAT):

34
Q

Specially designed to detect viruses and protect computer/files from harm

A

Antivirus Software:

35
Q

Secure networks established in public Internet infrastructure using specialized software, servers and data transmission protocols → sending data on public Internet as if it was a private network (large corporations use it to protect sensitive transmitted data between servers and connect devices)

A

Virtual Private Network (VPN):

36
Q

Copies of files to replace originals if lost or damaged

A

Backups

37
Q

Small device installed in computer. If notebook moves while alarm is activated, will emit 100-decibel sound.

A

Motion alarm:

38
Q

Protects all electrical devices in house → installed by electricians

A

Whole-house surge protector:

39
Q

Protects computer against power surge

A

Surge protectors:

40
Q

Occur when too much electrical current is passed through an outlet

A

Power surges: