chapter 11 - computer security Flashcards

(30 cards)

1
Q

Concerned with Risk Management, Confidentiality, Integrity, and the availability of electronic information that is processed and stored in a computing system.

A

computer security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

the recognition, consequences, and assessment of risk to a computer system.

A

risk management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

are people who attempt to invade or disable a computer’s security measures and steal their resources. Hackers also try to hijack computer processing cycles, speed, and storage space.

A

hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

______ are extremely easy to breach, especially by a seasoned hacker. Some techniques include:

  • Malicious attachments to emails
  • Viruses
  • Worms
  • Malware
A

Unsecured computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Businesses commonly take advantage of the Internet and sometimes setup ____

A

Intranets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The key aspect of an Intranet

A

privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

is guarded by Firewalls, hardware (Proxy Server) and software that keep unauthorized users out.

A

intranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

files that reproduce by making copies of themselves within a computer’s memory, storage, or network.

A

computer viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

are like viruses but do not need to attach itself to an existing files to spread.

A

worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

seem harmless and wait for a computer event to spread and unleash other malware.

A

trojan horses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

a computer program installed covertly and secretly monitors a user’s keystrokes and behavior.

A

spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

typically more irritating then malicious and usually installed covertly and automatically display or download advertising to a computer

A

adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

the abuse of an email system to arbitrarily send typically millions of unsolicited bulk messages.

A

spamming or junk ware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

attempts to make a computer or any of its resources unavailable to its users.

A

Denial-of-service attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

when a user signs in to a computer work station where a malicious software covertly records keystrokes.

A

reverse phishing / key logging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

attempts to identify, prevent, and eliminate computer viruses and malware. Examines computer files and matches them to known viruses stored in a database.

A

antivirus software

17
Q

Two of the more popular antivirus software

A

Symantics Corporation’s Norton AntiVirus and McAfee’s VirusScan.

18
Q

A broad term that refers to any fraudulent activity that occurs in an online setting.

A

internet fraud

19
Q

the crime of assuming another’s identity for economic gain.

A

Identity Theft

20
Q

a program that automatically clicks advertising networks ads, typically randomly, for profit.

21
Q

are simply when a unscrupulous merchant does not deliver goods or services already paid for online.

A

Purchase Scams

22
Q

a legitimate looking, socially engineered email attempting to deceptively gain private information.

23
Q

can be defined as the ability of an individual to keep their personal information out of public view.

24
Q

an expectation of remaining anonymous while using a computer system or network.

A

computer privacy

25
typically text files on a client computer that users are typically unaware of that keeps track of that user's information.
tracking cookies
26
when experts extract useful information from recorded data, like a cookie.
data mining
27
a crime concerning the unlawful practice of assuming another individual's identity.
identity theft
28
terms used to refer to all types of crimes in which someone wrongfully obtains and uses another person's personal data for fraud and deception.
Identity Theft and Identity Fraud
29
when a criminal in a public place glances over their victim's should to gain information like PIN numbers or passwords.
shoulder surfing
30
sorting through refuse to gain information that most likely should have been shredded.
dumpster diving