Chapter 11 Society, Security, Privacy Ethics Flashcards

(48 cards)

1
Q

What is computer crime?

A

is any illegal act involving a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Script Kiddie

A

same intent as a hacker

does not have technical skills and knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cyberextortionist

A

someone who uses email as a vehicle for extortion, threatens to attack company if not paid a sum of money

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cracker

A

someone who accesses a computer or network illegally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cyberterrorist

A

uses computers to damage or destroy computers for political reasons

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is an online security service?

A

checks computer for vulnerabilities, and provides recomendations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are some forms of internet and network attacks?

A

Computer viruses, worms, torjan horses, botnets, denial of service attacks, back doors, spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a payload?

A

is the destructive event or prank the program is intended to deliver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a worm?

A

a program that copies itself repeatedly, in memory , uses up resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a rootkit?

A

a program that hides in a computer

allows someone in a remote location to take full control of the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are some symptoms of viruses, worms, trojans?

A
Unusual messages or images
music or random sounds
memory less than expected
files dissapear
files become corrupted
programs or files dont work properly
unknown programs appear
OS doesnt start
OS shuts down unexpectedly
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What 4 ways can a payload be delivered?

A
  1. Open an infected file
  2. Runs an infected file
  3. Boots the computer with an infected removable media in a port
  4. Connects an unprotected computer to a network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are some precautions against viruses etc?

A

Trusted sources
Virus hoax
Macros - Instructions in software to continually update against attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Virus Signature

A

is a known specific pattern of virus code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Inoculate

A

Antivirus records imformation about files, if a virus tampers with the file, the antivirus will detect descrepencies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Quarantine

A

is a separate part of hard disk, holds infected files until it can be removed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Botnet

A

a group of comprmised computers connected to a network, being used to attack other networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Zombie

A

is a compromised computer
owner is unaware
being used from a remote location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Bot

A

a program that performs a repetitive task on a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Denial of service attack

A

Dos attack
an assualt on a computer
purpose- to disrupt access to an internet service
Jams, blocks legitimate visitors from accessing network

21
Q

DDos Attack

A

Distributed dos attack, means thats a zombie army is used to attack multiple computer networks

22
Q

Back doors

A

a program or set of instructions that allow users to bypass security and access the network

23
Q

Spoofing

A

a technique to make internet transmission appear legitimate to a victim

24
Q

IP spoofing

A

when people use fake IP addresses to gain access

25
What is a proxy server?
a server outside the computers network, controls which communicationspass into the companys network
26
Intrusion detection software
combined with a firewall, adds another layer of protection | assesses system vulnerabilites
27
Honeypot
a vulnerable computer that is setup to entice an intruder to break into it
28
AUP
acceptable use policy, outlines what netowk may and may not be used for
29
possessed object
any item you must carry to obtain access ti a computer or facility.....badge, card, smart card
30
License agreement
the right to use the software users to not own the software provides specific conditions for use of the software
31
Single user license agreement
EULA, included with software, uses can use on only one computer, make one copy as backup, give or sell if is first removed from computer.
32
Plaintext VS ciphertext
plaintext is readable. ciphertect unreadable
33
Encription key
programmed formula, recipient of data uses to decipher text
34
hash
is a mathematical formula that generates a code from the contents of the message and differs for each message
35
Transport layer security
successor of SSL secure socket layer encripts data web addresses with SSL have https instead of http
36
Secure HTTP
allows users to choose an encryption scheme for data | more difficult to use than SSL but more secure
37
VPN
Virtual private network
38
Brownout
a prolonged undervoltage
39
Surge protector
``` Smooths out noise provides stable current flow allows no more than 500 maximum volts to pass through line protects equipment from spikes one nansecond reaction time should have a rating of at least 200 ```
40
UPS
uninterurupitble power supply
41
Three generation backup
grandparent- oldest copy parent - second oldest copy child - most recent copy
42
What are some safeguards for wireless security?
ensure equipment uses wirless standards | 802.11i , wi-fi protected access, wires equivalent privacy
43
CVS
computer vision syndrome
44
Code of conduct
a written guideline that helps determine weather computer actions are ethical or not
45
Spim
spam sent through an instant message
46
split
is spam sent visa internet telephony
47
Phishing
sends an official looking email that attempts to obtain your personal imformation
48
Pharming
trhough spoofing attempts to obtain your personal details