module 7 Flashcards
cybercrimes
criminal acts committed with the use of computers
it included fraud related crimes and non fraud related crimes
non fraud related crimes
computer intrusion
child porn
unsolicited mails
virus
infected program that attaches itself to another program and so on
it slows down the network and messes up a bunch
how do viruses spread
sharing a disk or USB with infections
opening infected emails
downloading an infected file
what are the type of viruses
polymorphic virus
multipartite virus
stealth virus
polymorphic virus
rewrites itself to avoid detection
multipartite virus
infects multiple files
stealth virus
erase their code from the hard drive
reside in the active memory
what is an anti virus software
software designed to detect viruses
looks for virus’ signature
provide different options for deleting or fixing infected files
need to updated frequently to be up to date with the viruses
what do hackers do
try to steal data on hard drives
steal credit card and bank account info
how do hackers gain access to your computer
direct access (Hacking software)
indirect access (hacking internet connection or logical ports)
what are firewalls
software program or hardware designed to close logical port to invaders
what are the types of blue tooth attacks
blue snarfing
blue debugging
blue snarfing
EXPLOIT FLAW TO STEAL INFO FROM UR DEVICE
blue debugging
HACKER TAKE CONTROL OF THE DEVICE
how to prevent blue tooth attacks
make device invisible
should you use wifi from unknown sources
nah boy
what are the risks of anonymous web surfing
might risk an s/o of viewing your data
hacking tool might already be installed
whats a solutions to the risks of surfing anonymously on da web
ORTABLE PRIVACY DEVICE
LINUS OS ON A FLASH DRIVE
what is the function of biometric devices
read personal characteristics
security identification and authentication device
recognising the identity of a living person based on a physiological or behavioral characteristic
what are the characteristics of biometric devices
fingerprints
facial images
iris
voice recognition
what is a malware
software with malicious intent
program or file that is harmful to a computer user
what are types of malware
ADWARE
SPYWARE
VIRUSES
what are solutions to malware
ANTIPRYWARE
ANTIVIRUS