module 7 Flashcards

1
Q

cybercrimes

A

criminal acts committed with the use of computers

it included fraud related crimes and non fraud related crimes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

non fraud related crimes

A

computer intrusion

child porn

unsolicited mails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

virus

A

infected program that attaches itself to another program and so on

it slows down the network and messes up a bunch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

how do viruses spread

A

sharing a disk or USB with infections

opening infected emails

downloading an infected file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what are the type of viruses

A

polymorphic virus

multipartite virus

stealth virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

polymorphic virus

A

rewrites itself to avoid detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

multipartite virus

A

infects multiple files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

stealth virus

A

erase their code from the hard drive

reside in the active memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is an anti virus software

A

software designed to detect viruses

looks for virus’ signature

provide different options for deleting or fixing infected files

need to updated frequently to be up to date with the viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what do hackers do

A

try to steal data on hard drives

steal credit card and bank account info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

how do hackers gain access to your computer

A

direct access (Hacking software)

indirect access (hacking internet connection or logical ports)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what are firewalls

A

software program or hardware designed to close logical port to invaders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what are the types of blue tooth attacks

A

blue snarfing

blue debugging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

blue snarfing

A

EXPLOIT FLAW TO STEAL INFO FROM UR DEVICE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

blue debugging

A

HACKER TAKE CONTROL OF THE DEVICE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

how to prevent blue tooth attacks

A

make device invisible

17
Q

should you use wifi from unknown sources

18
Q

what are the risks of anonymous web surfing

A

might risk an s/o of viewing your data

hacking tool might already be installed

19
Q

whats a solutions to the risks of surfing anonymously on da web

A

ORTABLE PRIVACY DEVICE

LINUS OS ON A FLASH DRIVE

20
Q

what is the function of biometric devices

A

read personal characteristics

security identification and authentication device

recognising the identity of a living person based on a physiological or behavioral characteristic

21
Q

what are the characteristics of biometric devices

A

fingerprints

facial images

iris

voice recognition

22
Q

what is a malware

A

software with malicious intent

program or file that is harmful to a computer user

23
Q

what are types of malware

A

ADWARE

SPYWARE

VIRUSES

24
Q

what are solutions to malware

A

ANTIPRYWARE

ANTIVIRUS

25
spam
unwanted or junk mail use filter to vag on it
26
spim
unwanted instant messaging
27
what is phishing
fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information such as passwords and credit card numbers
28
hoaxing
attempt to make someone believe that something you know is false is true
29
how to protect your physical assets what to avoid
avoid sudden movement avoid excessive heat or cold avoid dust avoid food and liquids
30
what is a power surge
occurs when electricity is over 120 volts (in excess) a spike in your home's electrical current spike is very brief, usually lasting less than a thousandth of a second, but it can still cause damage to your home and appliances
31
causes of a power surge
OLD WIRING DOWNED POWER LINES MALFUNCTIONS AT THE SUBSTATIONS LIGHTING STRIKE
32
solutions to a power surge
BUY A SURGE PROTECTOR