module 3 Flashcards
(73 cards)
types of digital security risk
- internet and network attacks
- sytem failure
- unauthorized access and use
- software theft
- hardware theft, vandalism, and failure
- information theft
types of internet and network attack
- active attack
- passive attack
examples of active attacks
- denial of service attack
- malware infections
how to know if system in infected?
- system performance
- unusual activity
- security issues
- internet behavior
how to prevent malware?
- keep your software up to date
- install and maintain antivirus software
- be wary of email attachment and links
- be smart about downloading software
how to protect from unauthorized access and use?
- password
- PIN
- possessed object
- biometric device
- two-step verification
how software is protected?
- product activation
- software license agreement
how to protect from info theft?
- encryption
- digital signature
- digital certificate
- secure site
legal protection
- data privacy act of 2012 (RA 10173)
- electronic commerce act of 2000 (RA 8792)
- cybercrime prevention act of 2012 (RA 10175)
- anti wire-tapping law (RA 4200)
any event or action that could cause a loss of or damage to a computer or mobile device hardware, software, data, information, or processing capability
digital security risk
Any illegal act involving the use of a computer or related devices
computer crime
an online or Internet-based illegal act
cybercrime
unwanted intrusion into a computer network or system connected to the internet
internet and network attack
Attackers can have different motives, such as stealing data (financial information, personal details), disrupting operations (taking down websites, causing outages), or installing malware for further attacks
internet and network attack
The attacker actively tries to modify or harm data. This could involve installing malware, deleting files, or launching denial-of-service attacks (DoS/DDoS) to overload systems
active attack
The attacker gathers information without being noticed. This might i nvolve eavesdropping on network traffic to steal data or spying on user activity
passive attack
This attack aims to overwhelm a website or online service with a massive amount of traffic, making it unavailable to legitimate users. It’s like creating a huge crowd at a store entrance to prevent anyone from entering.
denial of service attack
It is a program that actively modifies your system, steals data, or disrupts operations. Viruses, ransomware, and Trojan horses all fall under this category
malware infection
spreads b/w computers
virus
spreads b/w computers in one company or location
worm
sneaks malware onto your computer
trojan
steals your data
spyware
spams with ads
adware
records user activity
keylogger