unit 09: Threats to your digital assets Flashcards

(89 cards)

1
Q

identity theft?

A

when a thief steals personal info and poses as you in financial or legal transactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

hacker?

A

anyone who unlawfully breaks a computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

3 types of hackers?

A
  1. white-hat hackers/ethical hacker - hacks to find system vulnerability
  2. grey-hat hacker - illegally hack a computer system to flaunt expertise but is harmless
  3. black-hat hackers - break computer systems to destroy/take illegal info
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

sniffer/packet analyzer?

A

program deployed by hackers to examine each packet and read its content

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

packet?

A

what data travels in when going through the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

trojan horse?

A

a program that appears to be something useful/wanted while running something malicious int eh background

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

backdoor program?

A

gives hackers full access to someone’s computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

rootkit?

A

a program that gives an outsider remote control over a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

zombie?

A

a computer that a hacker controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DoS attack?

A

denial-of-service attack - when legitimate users are denied access to a computer system due to it being zombified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DDoS attack?

A

distributed denial-of-service attack - the distribution of DoS attacks from multiple Zombies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

botnet?

A

a large group of devices that have been infected by robots/bots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

robots/bots

A

software programs that run autonomously

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

exploit kits?

A

software programs that run on servers and search for vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

logical ports?

A

virtual communication paths that allow computers to organize requests for info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

virus?

A

a program that attaches itself to a host program and attempts to spread to another computer through file exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

host program?

A

the program that a virus first attaches to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

what does a virus do?

A

replicates itself and copies its code into files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

is a virus a major threat?

A

no, but they slow down performances and display annoying messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

can Apple devices be affected by viruses?

A

yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

virus symptoms (6)

A
  1. sudden disappearance of icons/files
  2. takes you to places you don’t want to go
  3. odd pop-ups
  4. corrupted files
  5. program stop working properly
  6. system shuts down unexpectantly
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

boot-sector virus?

A

replicates itself onto a hard drive’s master boot record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

master boot record?

A

a program that executes whenever a computer boots up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Logic bomb?

A

a virus that is triggered when a certain logical condition is met (like opening a file)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
time bomb?
a virus that is triggered by the passage of time or on a certain date
26
worm?
an infection that is independent of a host and uses file transportation or network connection to spread
27
difference between worm and virus
worms don't require a host to spread
28
script?
a mini-program that is executed without users knowledge - meant to collect personal info
29
macro virus?
a virus that attaches to docs that use macros
30
Melissa virus?
first major macro virus
31
macro?
short series of commands that usually automates repetitive tasks
32
email virus?
a virus that uses the address book in emails to spread
33
encryption virus/ransomware?
runs a program that searches for common file types holding them hostage asking for a ransom to unlock them
34
polymorphic virus?
changes its own code to avoid detection - master of disguise
35
multi-partite virus?
infect multiple file types to confuse antivirus
36
stealth virus?
temporarily erases code from file - assassin
37
malware?
software that has malicious intent
38
3 types of malware
1. adware 2. spyware 3. viruses
39
adware?
malware that uses ads
40
spyware?
malware that is piggybacks other programs you install then runs in the background
41
keystroke logger/keylogger?
monitor keystroke with intent to steal codes
42
antispyware?
software that detects unwanted programs allowing you to delete them easily
43
spam?
unwanted email
44
spam filter?
a program that puts suspected spam messages into spam folder/junk mail
45
how much spam is caught by spam filters
up to 95%
46
cookies?
small text files that some sites automatically store on users hard drive when you visit the site
47
what are cookies used for?
gives companies info about site traffic control and effectiveness of marketing strategy
48
can cookies get personal info
no
49
social engineering?
a technique that uses social skills to generate human interaction in order to get them to reveal sensitive info
50
pretexting?
the act of creating a seemingly legitimate scenario to get the users to trust to get sensitive info
51
phishing?
lures internet users to reveal personal info leading to identity theft
52
pharming?
when malicious code is planted on a users computer which alters the browsers ability to find web addresses leading them to fake web addresses
53
scareware?
malware that tries to convince users that the computer is infected getting them to press a pop-up link which proceeds to spread the virus
54
data breach?
when sensitive info is copied/transmitted/views by unauthorized personnel
55
spear phishing?
when the virus send email to customers acting like a certain company
56
firewall?
a software program that is designed to protect a computer from hackers
57
personal firewall?
firewall designed specifically for home networks
58
which is better software or hardware firewall?
they are both equally as good but installing both will ensure max protection
59
2 ways firewalls protect computers?
1. block access to logical ports | 2. secure computer's network address
60
packet filtering?
a process where firewalls filter out data packets that are sent to specific logical ports
61
logical port blocking?
when firewalls completely refuse urel requests from the internet asking for access to specific ports
62
6 common logical ports?
1. FTP control - file transfer protocol control 2. telenet - unencrypted text communications 3. SMTP - simple mail transfer protocol 4. DNS - domain name system 5. HTTP - hypertext transfer protocol 6. HTTPS - HTTP with security
63
NAT?
network address translation - a process used by firewalls to assign internal IP addresses on a netowrk
64
antivirus software?
software that is designed to detect viruses and protect the computer form them
65
how long is free antivirus software available for typically
90 to 180 days
66
virus signature?
a portion of the virus code that is unique to a particular computer virus
67
3 way antivirus work
1. detect virus signatures 2. stop virus execution - quarantines the virus 3. prevent future infection - inoculates the virus
68
quarantining?
when an antivirus places a virus in a secure area of the hard drive so it cannot spread
69
inoculation?
when the antivirus records key attributes about computer files and saves them to the hard drive and compares them to current files to detect potential virus infections
70
drive-by download?
when malicious sites download harmful software to the user's computer
71
CAPTCHA?
completely automated pubic Turing test to tell computers and humans apart - used to prevent bot activity
72
biometric authentication device?
a device that read a unique personal characteristic and converts its pater into digital code - iris/fingerprint
73
5 security measures
1. password 2. fingerprint 3. gestures 4. facial recognition 5. iris scan
74
milti-factor authentication?
when a system requires multiple types of authentication before relaying authroization
75
3 authentication factors?
1. knowledge - password 2. possession - ID card 3. inherence - a biometric characteristic
76
VPN?
virtual private networks - secure networks that are established using the public internet infrastructure
77
backups?
copies of files that can replace the original if damaged/lost
78
2 types of files to back up?
1. program files - installation files for productivity software 2. data files - created/purchased files
79
2 types of backups
1. full backup - all apps and data files | 2. image/system - images of the entire computer and system software
80
3 places to store back up files
1. online - cloud 2. external hard drive 3. network-attached storage devices/home servers
81
incremental/partial backups?
backing up files that have changed/been created since the last back up
82
which backup should be updated more frequently? a) full b) image/system
a)
83
how are Apple computers backed up?
automatically to an external drive or NAS device
84
surge protector?
a device that protects users computers against power surges
85
how often should you replace your surge protector?
2 to 3 years/ after a major surge
86
whole-house surge protector?
protects all electrical device in the house form power surges
87
UPS?
uninterruptible Power Supply - battery backup if the power goes out
88
computer forensics?
identifying, extracting, preserving, and documenting computer evidence
89
computer security checklist (4 items)
1. firewall installed 2. antivirus/antispyware protection installed 3. frequent software updates 4. physically protecting the hardware