Chapter 11 Flashcards

1
Q

FBI Wanted List for cyber Criminals

A
  • had over 100 people on it
  • each responsible for consumer loss ranging from $35000 to 100 million
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Computer security is concerned with:

A
  1. risk management
  2. privacy (want to make sure all data is kept private)
  3. Integrity
  4. availability
    of e information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Risk management

A

recognition, consequences, and assessment of risk to a computers assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What percentage of employees steal data?

A

57%

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How often does identity theft happen?

A

every 2 seconds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

whats a hacker

A

someone who attempts to invade or disable a computer’s security measures and then to steal the computer resources at their leisure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

unsecured computer

A

extremely easy to breach, especially by a seasoned hacker. Many times these computers are connected to the Internet, so they receive emails with malicious attachments like viruses, worms, and malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the average time to identify a computer breach?

A

207 days for a company to identify

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

how many reports of identity theft did FTC receive

A

11 million

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What percentage of Americans have never checked to see if their data was breached?

A

64%

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What percentage of funds that are stolen are not recoverable?

A

68%

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Most common type of threats

A

-most common is use of stolen cards then followed by ransomware and phishing

  • average smart home could be at risk of more than 12,000 hacker attacks in 1 week
  • 43% of all breaches are insider threats either intentional or unintentional
  • over 24 billion passwords were exposed by hackers in 2022 and 64% pf passwords only contain 8-11 letters
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Hacker facts

A
  • only need internet and a computer
  • events held called hackathons
  • not all hackers are paid
  • look to steal information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

3 things hackers look for

A
  1. information
  2. places to store information other than their own computer
  3. processing power
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

types of hackers

A
  • white hat hackers
  • black hat hackers
  • script kitties
  • Cracker
  • hactivist
  • cyberterrorist
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How do you keep hackers out

A
  1. firewall
  2. virus utilities
  3. strong passwords
17
Q

firewalls

A
  • kept unauthorized users out
    -specialized hardware and software working together that ensures that only authorized personnel and employees within a business can use its Intranet.
18
Q

proxy server

A

communications in or out of an intranet pass through a special security computer

19
Q

“default-deny”

A

firewall rule set in that the only network connections that are permitted are the ones that have been explicitly allowed

20
Q

“default-allow”

A

rule set in that all traffic is allowed unless it has been specifically blocked

21
Q

Worms

A
  • self replicating
    -send copies of themselves to other parts of the network without user knowing
22
Q

Trojan horses

A

-seems harmless and possibly interesting at first until it is executed.

-

23
Q

Denial-of-service attack (DOS)

A

attacks target entire networks making them unavailable to users
causes:
-loss of revenue
- have to get an IT team costs money
- spending and wasting valuable time trying to fix it
- lose customer trust

24
Q

What should a workplace policy consist of?

A
  • best practices
  • code of conduct
  • mobile phone usage
  • smoking, drugs, alcohol, vaping
  • track employees (error rate, arrival times, break times, etc)
  • transactions process
  • website visiting and surfing
25
what should an internet policy consist of?
- business monitors computers to see what youre looking up - monitor what you access on your computers
26
what should privacy policy consist of?
- most companies ask for pin numbers to verify its the correct person
27
reverse phishing/keylogging
keylogging is when perpetrators log into your computer and get access to it from anywhere reverse phishing is they come to your computer and install a program
28
what is internet fraud
any type of fraud that is over the world wide web, takes place through emails, websites, etc.
29
click fraud
deals with advertising, tries to manipulate the system to get paid from click ads of others
30
purchase scam
a buyer (typically from another country) asks to purchase something with a credit card once items are shipped the credit card is cancelled
31
dumpster diving
diving into a dumpster to look for your information
32
data diving
websites like amazon, netflix, yahoo, etc collect your data to try and understand it and evaluate it to suggest more things similar to what you normally buy or watch
33
how to protect yourself
"SCAM" - Stingy with information - Check your financial records - Ask for credit reports - Maintain careful records
34
shoulder surfing
a criminal in a public place can simply glance over victims shoulder and get their phone number, password on laptop, credit card #, etc.