Computer Security Awareness Flashcards

1
Q

What is computer security?

A

Computer security is the protection of computers, networks, and all the data one stores and/or enters into a public or personal computer system.

The definition of computer security can range from malicious software and the negative effects it imposes on a system to the protection of personal information from theft or fraud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a threat?

A

A threat is a potential for harm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a threat to computer security?

A

Any situation, whether intentional or unintentional, that permits potential for causing harm and/or modification of computer data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Malicious Software

A

Software designed to cause damage to a single computer, server, or an entire computer network. Also known as malware, malicious software is most often installed on the computer without the user’s knowledge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Phishing

A

The scamming of users by sending emails or creating false web pages that are designed to collect an individual’s personal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Identity Theft

A

Crime in which someone wrongfully obtains and uses another person’s personal data in some way that involves fraud or deception.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Loss of Data

A

The loss of information stored on a computer. Data loss is permanent; it’s causes include power failure, hardware failure, data corruption, software crash, etc. Backup and recovery schemes are developed to restore lost data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Are all computer security threats intentional?

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is malicious software intended to do?

A

Damage, immobilize, or perform unwanted actions to a computer system. It comes in many forms and can be any program that the user does not need, want, or even expect to download. Malware usually runs without the knowledge and permission of the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Viruses

A

A computer virus is any malicious code that has the ability to reproduce itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Spyware

A

Spyware is a program that is intentionally installed on a computer to monitor or spy on what users of the computer are doing. Spyware programs are designed to track a user’s activity without the user fully understanding the intentions of the program or even knowing about its installation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Worms

A

Like a virus, is designed to copy itself from one computer to another, but it does so without having to attach itself to a host program or file. A worm generally spreads without user action and distributes complete copies of itself across different networks in vast volumes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Trojan horse

A

A Trojan horse is a computer program that appears to be harmless, but it contains malicious code. When a Trojan horse is executed, it can delete files, destroy or modify data, erase a computer’s hard drive, steal confidential information, and compromise the security of a computer or network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Spam

A

Spam is junk e-mail on the internet sent to thousands, sometimes millions, of people without their consent. Spam usually promotes a particular product, service, or scam of some type.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a computer virus?

A

A software program designed to infect, destroy, modify, or cause other problems with your computer’s software programs or entire network. Viruses spread from one file to another using a variety of methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Contracting Computer Viruses

A

In the past, the majority of computer viruses were contracted by sharing floppy disks. However, with the rise of the internet, most computer viruses today are contracted through e-mail, downloading software and files, and even just surfing the internet. In fact, you can get a malicious script from a webpage and not even know it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Virus Symptoms

A
  • Slow computer speed
  • Randomly deleted files
  • Inexplicable error messages when opening files or programs
  • Hardware issues, including problems with the keyboard, printer, modem, etc.
  • computer freezes or crashes
  • Redirected internet pages
  • Difficulty connecting online or surfing the web
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Virus Prevention

A

• Use care if downloading from a website
• Use only authorized websites (i.e., websites related to your work activities).
• Ensure antivirus software is installed on your computer and that the system shield is active
• Scan every potential download with an antivirus program
• If someone you don’t know sends you an attachment via email or even instant message, do not open it.
• Consider adding on applications via your internet browser that protect you from suspicious websites that may contain malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What if your computer gets infected by a virus?

A

• Contact your tech department immediately for guidance.
• Make sure your antivirus program is current. Visit the manufacturer’s website to check for any updates and install them immediately
• Scan your entire computer with the fully updated antivirus program
• Be sure to update your firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is one method of spreading a computer virus?

A

viewing web pages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is spyware?

A

Any program that is secretly installed on a computer to monitor a user’s interaction with the computer, monitor surfing habits, or redirect browser activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

How spyware interferes with computer security?

A

• Collects personal information, including surfing habits and sites visited
• Monitors keystrokes and harvests private information, such as credit card numbers
• Interferes with user control of the system
• Installs additional software without the user’s knowledge
• Redirects web browser activity
• Randomly accesses websites that may contain more harmful viruses
• Diverts advertising revenue to a third party
• Changes computer settings
• Slows connection speeds

23
Q

What if your computer gets hacked or infected with spyware?

A

There are many commercial and free anti-spyware programs available. Visit the Microsoft Corporation website for a list of trusted removal sites. However, always consult your organization’s computer policies before downloading anything from the internet.

24
Q

What are the different forms of phishing?

A

Phishing can be in the form of an email, a popup, or even a phone call pretending to be from a computer security firm.

Phishing emails can be very convincing and look exactly like a legitimate email. They often ask users to provide their personal and financial information, such as credit card numbers or online banking passwords.

25
Q

Who do Phishing emails appear to be from?

A

An official retailer, bank, organization, or government agency. The typical phishing email will claim that there is a “problem” with your account or recent online order and ask you to click on a link

26
Q

What is something you need to remember concerning phishing?

A

Legitimate companies will not ask for confidential information, such as passwords and account numbers, by e-mail.

If you suspect an email is fraudulent, call the company or institution directly. They often have special departments for dealing with phishing emails.

27
Q

Tips for avoiding phishing

A

• Do not click on links on a suspicious email
• Never respond to emails that request personal financial information

28
Q

Phishing occurs in the form of?

A

A fraudulent e-mail

29
Q

What can be taken through identity theft?

A

Social security number, bank account, credit card number, telephone number, address, and other identifying records.

30
Q

Tips for avoiding online identity theft

A

• Watch out for “phishy” emails
• Don’t click on links within emails that ask for your personal information.
• Phony sites that look just like the real sites of the company can trick you. To check whether the message is really from the company or agency, call it directly or go to it’s website (use a search engine to find it instead of clicking on the link they provide)

• Beware of “pharming.” This latest version of online ID theft is caused by a malicious program that hijacks your web browser and directs you to a fake copy of a legitimate site, such as your bank’s homepage. Any personal information you provide at the phony site can be stolen and fraudulently used

• Never enter your personal information on a pop-up screen

• Protect your computer with spam filters, anti-virus and anti-spyware software, and a firewall. Be sure to keep them up to date. In work settings, your place of employment should provide this software for you

• Only open email attachments if you’re expecting them and know what they contain. Even if the message looks like they came from people you know, they could be from scammers and contain programs that will steal your personal information

31
Q

What can you do if you are a victim of online identity theft?

A

Contact the Federal Trade Commission ID Theft Clearinghouse: http://www.ftc.gov/bcp/edu/microsites/idtheft/ or call 877-438-4338 for more information.

You can also file complaints here: http://www.ic3.gov/default.aspx

32
Q

What is the latest version of online ID theft that is a virus or malicious program that is secretly planted in your computer and hijacks your web browser?

A

Pharming

33
Q

What can cause data loss?

A

Power outages, computer crashes, and even spilled coffee can cause data to become lost or damaged beyond repair.

34
Q

What should you do in the event of data loss?

A

Make sure to save backup copies of your important files. If any data on the computer is important to you, back it up on a regular basis.

35
Q

How often should you back up your data?

A

Ideally you want to back up your data every day or once a week.

36
Q

Should you save your log on information?

A

Don’t save your logon information. Always log out of websites by clicking “log out” on the site.

37
Q

What happened to the University of Utah Student who tried to change his grade through computer hacking?

A

He will serve a maximum penalty of five years in prison and pay a $250,000 fine.

38
Q

What happened to the California teenager that tried to change his and several other classmates grades?

A

Faces up to 38 years in prison.

39
Q

What is a password?

A

A password is a string of characters entered into a computer system, usually along with a user name, to gain access to a program or sensitive information.

40
Q

What makes a good password?

A

• A password should not be a word listed in any dictionary of any language

• A password should not be anything that can be related to the user: the name of a wife, child, a nickname, a birthday, etc

• A strong password should appear to be a random string of characters to an attacker

• Passwords should be long. They should be 14 characters or longer (eight characters at minimum)

• It should include a combination of uppercase and lowercase letters, numbers, and symbols, including punctuation marks

• You should change your password regularly

• Don’t write your passwords down

• Never share your passwords with other people

Remember “fluffy” will not protect you as much as “Fluf909fy!”

41
Q

What is an example of a strong password?

A

SnowF@68e1$

42
Q

E-mail Security

A

Simply checking your e-mail can pose online risks. Don’t assume your e-mail is ever private, especially on a public computer. E-mail can be intercepted by hackers or by others with access to your computer.

43
Q

What are some safety tips you can use whether you’re sending or receiving email?

A

• Don’t open attachments from unknown senders

• Be wary of e-mail messages that are not directly sent to you by name

• Be wary of website addresses advertised in e-mail messages. If the message is unsolicited or looks remotely suspicious, don’t click on any links. Conduct a web search and go to the site on your own to verify that it is legitimate

• Think before forwarding emails. Watch out for odd messages out of your inbox

• Use the Bcc: (Blind courtesy copy) line when sending mass e-mail messages. This hides the e-mail addresses of your recipients from each other

44
Q

E-mail Attachments

A

You should be wary of attachments that display or represent any of the following:

• Suspicious or unknown file extensions (.exe, .vbs, .bin, .pif, .zzx)
• Incorrect, misspelled, or suspicious file names
• Off the mark subject lines: “Funny!”, “Free!”, “You’re a Winner!”
• The e-mail containing the attachment to you, yet, it appeared in your inbox
• Any attachment you were not expecting from the sender

45
Q

Which of the following usually promotes a particular product, service, or scam of some type?

A

Spam

46
Q

Which of the following is a recommended method of creating passwords?

A

Combine letters, numbers, and symbols.

47
Q

A threat is _______.

A

A potential for harm

48
Q

Based on the Microsoft Corporation’s steps for creating strong passwords, which of the following would be considered the strongest password?

A

SongBird2%

49
Q

Which of the following forms of malware can possibly steal personal information?

A

A Trojan horse

50
Q

Which of the following is a computer program that appears to be harmless but actually contains malicious code, and it’s when executed, it can delete your files, destroy or modify data, erase a computer’s hard drive, steal confidential information, and compromise the security of your network?

A

A Trojan horse

51
Q

Which of the following is a program that is intentionally installed on the computer by a user to monitor what users of the computer are doing?

A

Spyware

52
Q

What is the most common method for spreading computer viruses?

A

E-mail attachments

53
Q

Which of the following is one of the symptoms that your system may be infected by a virus?

A

Slowdown in system speed

54
Q

Which of the following is (are) a way(s) to protect yourself when using a public computer?

A

Change your password often; keep an eye out for people looking over your shoulder.