Computer Security, Safety, Ethics and Privacy Flashcards

(82 cards)

1
Q

Action that causes loss of or damage to computer system.

A

Computer Security Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

is a potentially damaging computer
program. Can spread and damage
files.

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

copies itself repeatedly, using up resources
and possibly shutting down computer or
network.

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

hides within or looks like a legitimate
program until triggered. Does not
replicate itself on other computers.

A

Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

can be a small program, or script, that
automates common tasks. These scripts are usually run within other programs.

A

Macros

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Set macro security level in applications that allow you to write macros
such as in MS Word, MS Excel, etc.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Identifies and removes computer viruses. Most also protect against worms and
Trojan horses.

A

Antivirus Program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Specific pattern of
virus code

A

Virus Signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Also called virus definition

A

Virus Signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Antivirus programs
look for virus
signatures

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How does an
antivirus program
inoculate a
program file?

A
  1. Records information about programs such as file size and creation date.
  2. Attempts to remove any detected virus
  3. Uses information to detect if virus tampers with file.
  4. Quarantines infected files that it cannot remove.
  5. Keeps file in separate area of hard disk
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

is an assault which disrupts computer access to an Internet service such as the Web or e mail

A

denial of service attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

is a program or set of instructions
in a program that allow users to bypass
security controls when accessing a computer
resource

A

Back door

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Makes a network or Internet
transmission appear legitimate

A

Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

occurs when an intruder
computer fools a network into believing
its IP address is from a trusted source. It trick their victims into interacting with a phony Web site.

A

IP Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Security system consisting of hardware and/or software that prevents unauthorized intrusion.

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Program that protects personal computer and its data from unauthorized intrusions and Monitors transmissions to and from computer.

A

Personal Firewall Utility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Informs you of attempted
intrusion

A

Personal Firewall Utility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

defines who can access computer & what
actions they can take

A

Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

records
access attempts

A

Audit Trail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

analyzes network traffic, assesses system
vulnerabilities, and identifies intrusions and suspicious behavior

A

Intrusion Detection Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are other ways to
protect your personal
computer?

A

Disable file and
printer sharing on
Internet connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Unique combination
of characters that
identifies user

A

user name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

is private
combination of
characters
associated
with the user name
that allows access
to computer
resources

A

Password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Item that you must carry to gain access to computer or facility Often used with numeric password called personal identification number (PIN)
Possessed Object
26
Authenticates person’s identity using personal characteristic (Fingerprint, hand geometry, voice, signature, and iris)
Biometric Device
27
is act of stealing computer equipment
Hardware Theft
28
is act of defacing or destroying computer equipment
Hardware Vandalism
29
Act of stealing or illegally copying software or intentionally erasing programs
Software Theft
30
is illegal duplication of copyrighted software
Software Piracy
31
Right to use software
license agreement
32
allows user to install software on one computer, make backup copy, and sell software after removing from computer
Single user license agreement
33
allows user to input product identification number online or by phone and receive unique installation identification number
Product Activation
34
promotes better understanding of software piracy problems
Business Software Alliance (BSA)
35
What are some other safeguards against software theft?
1. Product Activation 2. Business Software Alliance (BSA)
36
Safeguards against information theft Process of converting plaintext (readable data) into ciphertext (unreadable characters)
Encryption
37
often uses more than one method To read the data, the recipient must decrypt , or decipher, the data
Encryption Key
38
How do Web browsers provide secure data transmission?
1. Secure Site 2. Digital Certificate 3. Many Web browsers use encryption
39
is Web site that uses encryption to secure
Secure Site
40
is notice that guarantees Web site is legitimate
Digital Certificate
41
Authorized person or company that issues and verifies digital certificates
Certificate Authority (CA)
42
Provides encryption of all data that passes between client and Internet
Secure Sockets Layer (SSL)
43
Web addresses beginning with “https” indicate
secure connections
44
Caused by aging hardware, natural disasters, or electrical power disturbances
system failure
45
Can cause loss of hardware, software, or data. Prolonged malfunction of a computer
system failure
46
Protects computer and equipment from electrical power disturbances
Surge Protector
47
is surge protector that provides power during power loss
Uninterruptible power supply (UPS)
48
Duplicate of file, program, or disk
Backup
49
Three Types of Backup
1. Full backup 2. Selective backup 3. Three Generation Backup
50
In case of system failure or corrupted files, restore files by copying to original location
51
How can I ensure my wireless communication is secure?
Secure your wireless access point (WAP) should not broadcast your network name Enable Wired Equivalent Privacy or Wi Fi Protected Access (WiFi)
52
WiFi networks around Luneta and Manila City Hall, mapped using
wardriving
53
Moral guidelines that govern use of computers and information systems
Computer Ethics
54
rights to which creators are entitled for their work
Intellectual property rights
55
what are the list of computer ethics
1. Software theft 2. Information accuracy 3. Codes of conduct 4. Information privacy 5. Intellectual property rights 6. Unauthorized use of computers and networks
56
Written guideline that helps determine whether computer action is ethical
IT code of conduct
57
Right of individuals and companies to deny or restrict collection and use of information about them
Information Privacy
58
is using computers to observe employee computer use
Employee Monitoring
59
Data collected when you fill out form on Web
Electronic Profile
60
Small file on your computer that contains data about you
cookie
61
Scam in which a perpetrator sends an official looking e mail that attempts to obtain your personal and financial information
phishing
62
is program placed on computer without user’s knowledge
Spyware
63
is a program that displays online advertisements
Adware
64
Service that blocks e mail messages from designated sources Collects spam in central location that you can view any time
Email Filtering
65
Attempts to remove spam Sometimes removes valid e mail messages
Anti spam program
66
Process of restricting access to certain material Internet Content Rating Association (ICRA) provides rating system of Web content
content filtering
67
restricts access to specified sites
Web filtering software
68
Methods that guarantee a computer or network is safe from computer viruses, worms, and Trojan horses exist.
False
69
Web addresses of pages that use TLS (Transport Layer Security) typically begin with https, instead of http.
True
70
A cyberextortionist uses the Internet or network to destroy or damage computers for political reasons.
False
71
A brownout is a complete power failure.
False
72
A corrupt individual stealing credit card numbers to make fraudulent purchases is an example of information theft.
True
73
A surge protector absorbs small overvoltages — generally without damage to the computer or equipment.
True
74
A(n) ________ is someone who uses e-mail as a vehicle for extortion.
cyberextortionist
75
A standby UPS, sometimes called an offline UPS, runs constantly off the battery, which provides continuous protection.
76
It is illegal for employers to use software programs that monitor employees.
False
77
Although eyestrain associated with CVS (computer vision syndrome) is not thought to be disruptive or unpleasant, it has serious long-term consequences.
False
78
To prevent repetitive strain injury, take all of the following precautions except ____.
use the heel of the hand as a pivot point while typing or using the mouse
79
A(n) ____ is an injury or disorder of the muscles, nerves, tendons, ligaments, and joints.
RSI
80
A spyware program communicates information it collects to some inside source while a user is offline.
false
81
Web ____ software is a program that restricts access to specified Web sites.
filtering
82
Typically, the amount of protection offered by a surge protector is inversely proportional to its cost; that is, the more expensive, the more protection the protector offers.
True