Chapter 5 Notes Pt. 1 Flashcards
a group of compromised computers or mobile devices connected to a network
botnet
A botnet composed computer or device is known as a ________
zombie
_______ ___ _______ _______ (____ _______) disrupts computer access to Internet services
denial of service attack (DoS attack)
a program or set of instructions in a program that allow users to bypass security controls
back door
a technique intrudes use to make their network or Internet transmission appear legitimate
spoofing
hardware and/or software that protects a network resources form intrusion
firewall
What is the difference between unauthorized access and unauthorized use?
unauthorized access- the use of a computer or network without permission
unauthorized use- the use of a computer or its data for unapproved or possibly illegal activities
To protect files on your local hard disk from hackers and other intrudersm turn off ___ and _______ _______ on your Internet connection
file
printer
sharing
a security measure that defines who can access a computer, device, or network
access control
Access control defines:
(1) who can access a computer
(2) when they can access it
(3) what actions can be taken while accessing it
a unique combination of characters that identifies one specific user
user name
a private combination of characters associated with the user name that allows access to certain computer resources
password
A ___________ ________ is any item that you can, to gain access to a computer or computer facility
posessed object
A posessed object can often be used in combination with a ____ (_________ ____________ _________)
PIN (personal identification number)
authenticates a person’s identity by translating a personal characteristics into a digital code that is compared with a digital code in a computer
biometric device
the discovery, collection, and analysis of evidence found on computers and networks
digital forensics
Software theft occurs when resources:
(1) steals software media
(2) inetionally erases programs
(3) illegally registers and/or activites a program
(4) illegally copies a program
A single-user license agreement typically contains the followign conditions:
You can:
(1) install the software on only one computer
(2) make one copy of the software as a backup
(3) give or sell the software to another individual, but only if the software is removed from the user’s computer first
A single-user license agreement typically contains the followign conditions:
You cannot:
(1) install the software on a network’s software
(2) export the software
(3) rent or lease the software
(4) give copies to friends and colleagues, while continuing software
What are the common types of malware?
(1) virus
(2) worm
(3) trojan horse
(4) rootkit
(5) spyware
(6) adware
Which type of malware is this:
a potentially damaging program that affects, or infects, a computer or mobile device negatively by altering the way the computer or device works without the user’s knowledge or permission
virus
Which type of malware is this:
a program that copies itself repeatedly, using up resources and possibly shurring down the computer, device, or network
worm
Which type of malware is this:
a program that hides within or looks like a legitimate program.
trojan horse
Which type of malware is this:
a program that hides in a computer or mobile device and allows someone from a remote location to take full control of the computer or device
rootkit