IT Security and Ethics Flashcards
(66 cards)
is any event or action that could cause a loss of or damage to a computer or mobile device hardware, software, data, information, or processing capability.
digital security risk
Any illegal act involving the use of a computer or related devices
DSR: COMPUTER CRIME
is an online or Internet-based illegal act.
DSR: CYBERCRIME
TYPES OF DIGITAL SECURITY RISK:
- Internet and network attacks
- Unauthorized access and use
- Hardware theft
- Software theft
- Information theft
- System failure
is essentially an unwanted intrusion into a computer network or system connected to the internet.
Attackers can have different motives, such as stealing data (financial information, personal details), disrupting operations (taking down websites, causing outages), or installing malware for further attacks.
internet or network attack
INTERNET AND NETWORK ATTACK
Types of Attacks:
- Active Attacks: The attacker actively tries to modify or harm data. This could involve installing malware, deleting files, or launching denial-of-service attacks (DoS/DDoS) to overload systems.
- Passive Attacks: The attacker gathers information without being noticed. This might involve eavesdropping on network traffic to steal data or spying on user activity.
INTERNET AND NETWORK ATTACK
EXAMPLE OF ACTIVE ATTACKS:
- Denial-of-Service (DoS) attack
- Malware infections
This attack aims to overwhelm a website or online service with a massive amount of traffic, making it unavailable to legitimate users. It’s like creating a huge crowd at a store entrance to prevent anyone from entering.
Denial-of-Service (DoS) attack
Attacker -> Bombs the victim with HTTP requests
Malware is shorten for malicious software. It is a program that actively modifies your system, steals data, or disrupts operations. Viruses, ransomware, and Trojan horses all fall under this category.
Malware infections
Some examples of internet and network attack
- Virus = Spreads between computers
- Worm = Spreads between computers in one company or location
- Trojan = Sneaks malware into your computer
- Spyware = Steals your data
- Adware = Spams you with ads
- Ransomware = Encrypts files and blackmails you
- Fileless malware = Operates in your system’s memory
- Rootkit = Gives remote access to your device
- Botnet = Turns your PC into a puppet
- Keylogger = Records user activity
is a type of malicious software, or malware, specifically designed to spread itself from one computer to another. They replicate by attaching themselves to other programs or files, and then those infected programs or files spread the ——- when they are opened or executed.
computer virus
is a piece of malware similar to a virus, but with a key difference: how it spreads. Unlike viruses that need to piggyback on other programs, —— can replicate themselves independently.
computer worm
HOW TO KNOW IF YOUR SYSTEM IS INFECTED BY A MALWARE?
System Performance:
- Slowness
- Frequent crashes
Unusual Activity:
- Pop-ups and spam
- Unknown programs
- Excessive disk activity
Internet Behavior:
- Homepage changes
- Connection issues
Security Issues:
- Disabled antivirus
- Security software warnings
How to prevent malware in your device?
- Install and Maintain Antivirus Software
- Be wary of Email Attachment and Links
- Be Smart about downloading software
- Keep your software up to date
refers to someone gaining entry to a computer system, network, or data storage without permission and using it for unintended purposes. This is a major security concern because it can lead to a variety of harmful consequences.
Unauthorized access
is the improper or unintended utilization of a computer system, network, or data storage after someone gains unauthorized access.
Unauthorized use
How to protect yourself from unauthorized access and use?
password
pin
possessed object
biometric device
two-step verification
A passphrase is a private combination of words, often containing mixed capitalization and punctuation, associated with a user name that allows access to certain computer resources.
Password
Minimum Length: Most websites and applications will enforce a minimum password length, typically between _______ characters. Longer passwords are always better for security.
8 and 12
Character Types: Many services require passwords to include a combination of different character types for increased complexity. This often includes:
Uppercase letters (A-Z)
Lowercase letters (a-z)
Numbers (0-9)
Symbols (!@#$%^&*)
sometimes called a passcode, is a numeric password, either assigned by a company or selected by a user.
PIN (personal identification number)
is any item that you must possess, or carry with you, in order to gain access to a computer or computer facility.
possessed object
authenticates a person’s identity by translating a personal characteristic into a digital code that is compared with a digital code in a computer or mobile device verifying a physical or behavioral characteristic.
biometric device
uses two separate methods, one after the next, to verify the identity of a user.
Two-step verification