Unit 7 – Security Flashcards
```
~~~
When personal information such as name, address, SIN, birth date, bank account numbers, and credit card information is stolen
Can occur in-person or via computer
Identity Theft
A person who unlawfully breaks into a computer system
Hacker
Ethical hackers, break into system to test and find vulnerabilities so they can be parched → “good guys”
White-Hat Hackers:
Break into system to destroy things or for illegal gain → “bad guys”
Black-Hat Hackers
Grey-Hat Hackers
Illegally break into systems to expose flaws, gain attention, show expertise, or
sell security repair service
Malicious computer program that attaches itself to another program and tries to spread when files are shared between 2 computers
Can cause programs and files to: disappear, change home pages, show strange messages, popup, play music/odd sounds, corrupt data, make programs not function, shut down your system unexpectedly
Virus
Changes its own code to avoid detection
Polymorphic Virus
Many parasites → designed to infect many files, making it harder to find
Multipartite Virus
Temporarily erases code from their files and hides it in active memory
Stealth Virus:
Targets the Master Boot Record so that your computer loads it every time it starts → during start up, virus gets loaded on computer’s memory
Boot-Sector Viruses
execute when logical conditions are met (Example: opening a file, perform an action)
Logic bombs:
execute at a set date or time
Time bombs:
Transport themselves through networks/emails and spread on their own → usually generates lots of data traffic (slows down Internet)
Worm
Several commands that execute without your knowledge, often used to collect personal information
Script
Attaches itself to document that uses macros (Example: Excel)
Macro Virus
Distribute viruses to a person’s friend by attaching itself to their contact list
Email Viruses
Ransomware – makes programs unusable and asks for money to decrypt them
Encryption Virus
Software that has malicious intents.
Malware
3 types OF Malware
Software that displays ads
Adware
3 types OF Malware
Unwanted background program → transmits personal
information, habits and tracks cookies
Spyware
3 types OF Malware
Viruses
Unsolicited emails vs. Unsolicited instant messages
Spam vs. Spim:
Small text files stored automatically on your hard drive by websites you visit so they can track visits, ads, online forms you fill in, etc.
Cookies:
When files are automatically downloaded to your file when you visit a website (1 in 1000 websites have this issue according to Google)
Drive-by Download:
Using social skills to obtain sensitive information (Example: telephone scams)
Social Engineering:
Creating a scenario where the person sounds legitimate so you trust them and give them information
Pretexting
Pretexting done in cyberspace (Example: email stating to update/confirm an account information)
Phishing
Programs that direct users to fake sites when they enter a legit one
Pharming
Makes popups, banners and other messages telling you your computer is infected
(Example: directing to website selling fake removal antivirus tools)
Scareware
Program that closes logical ports (used by hackers) to prevent unwanted access to your computer → blocks access to logical ports AND keep computer’s network address secure
Firewall
Firewall
Process by which firewalls monitor incoming and outgoing packets and filter out packets sent to specific logical ports
Packet Filtering:
Firewall
Process where firewalls can be configured to ignore requests originating from Internet asking to access certain ports
Logical Port Blocking:
Firewall
Process used by firewalls to assign internal IP address on network → can’t be detected by hackers (even when they know your public IP address)
o Internet Protocol Address (IP Address): every computer connected to Internet has unique address assigned to router by Internet Service Provider (ISP)
Network Address Translation (NAT):
Specially designed to detect viruses and protect computer/files from harm
Antivirus Software:
Secure networks established in public Internet infrastructure using specialized software, servers and data transmission protocols → sending data on public Internet as if it was a private network (large corporations use it to protect sensitive transmitted data between servers and connect devices)
Virtual Private Network (VPN):
Copies of files to replace originals if lost or damaged
Backups
Small device installed in computer. If notebook moves while alarm is activated, will emit 100-decibel sound.
Motion alarm:
Protects all electrical devices in house → installed by electricians
Whole-house surge protector:
Protects computer against power surge
Surge protectors:
Occur when too much electrical current is passed through an outlet
Power surges: