Computer Threats Flashcards

1
Q

Define Computer network threat

A

any circumstance / that can harm the devices on a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is identity theft

A

stealing of one’s personal identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is industrial espionage

A

the illegal and unethical theft of business secrets for use by a competitor to gain a competitive advantage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is credit card fraud

A

unauthorized use of a credit/debit card to fraudulently obtain money or property.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what are some types of computer threats?

A

phishing, virus, trojan, pharming, worm, spyware, logic bombs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is phishing?

A

Phishing is a method of engineering which is used to obtain sensitive information through the use of emails that look legitimate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a virus

A

A virus is a piece of software that is spread from one computer to another with the intent to corrupt and destroy data & information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define Trojan

A

Trojan is a malicious code/software that tricks users into running it willingly by hiding behind a legitimate program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define pharming

A

Pharming is a scamming practice in which a malicious code is installed on a PC/server then it misdirects users to fraudulent websites without their knowledge/consent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define worm

A

A computer worm is a malicious software program that infects other computers while remaining active on infected systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define spyware

A

Spyware is a type of malware that is installed on a computing device without the users knowledge. It invades the device and steals information then relays it to external users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define Logic Bombs

A

A logic bomb is a piece of code that implements a malicious function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are some malicious functions that logic bombs carry out?

A

deleting important files
corrupting or altering data
reformatting a hard drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Computer network is broken down into 2 parts, what are they?

A

Physical & Logical security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Give 4 resources used in physical security control

A

surveillance cameras
locks
security guards
keypad locks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is physical security control designed to do?

A

to prevent unauthorized personnel from gaining access to a network and its components

17
Q

What is the difference between motion detectors and biometric?

A

Motion detectors are used to sense activity and biometric is used to automatically recognize people by their biological or behavioral characteristics.

18
Q

What is logical security designed to do?

A

to protect your computers and data from unauthorized access

19
Q

Give three examples of what logical security does

A

it uses encryption, firewalls to protect usernames & passwords

20
Q

What is a firewall?

A

a network security device that monitors incoming and outgoing network traffic and permits or blocks data packets.