Unit 7 – Security Flashcards
(40 cards)
```
~~~
When personal information such as name, address, SIN, birth date, bank account numbers, and credit card information is stolen
Can occur in-person or via computer
Identity Theft
A person who unlawfully breaks into a computer system
Hacker
Ethical hackers, break into system to test and find vulnerabilities so they can be parched → “good guys”
White-Hat Hackers:
Break into system to destroy things or for illegal gain → “bad guys”
Black-Hat Hackers
Grey-Hat Hackers
Illegally break into systems to expose flaws, gain attention, show expertise, or
sell security repair service
Malicious computer program that attaches itself to another program and tries to spread when files are shared between 2 computers
Can cause programs and files to: disappear, change home pages, show strange messages, popup, play music/odd sounds, corrupt data, make programs not function, shut down your system unexpectedly
Virus
Changes its own code to avoid detection
Polymorphic Virus
Many parasites → designed to infect many files, making it harder to find
Multipartite Virus
Temporarily erases code from their files and hides it in active memory
Stealth Virus:
Targets the Master Boot Record so that your computer loads it every time it starts → during start up, virus gets loaded on computer’s memory
Boot-Sector Viruses
execute when logical conditions are met (Example: opening a file, perform an action)
Logic bombs:
execute at a set date or time
Time bombs:
Transport themselves through networks/emails and spread on their own → usually generates lots of data traffic (slows down Internet)
Worm
Several commands that execute without your knowledge, often used to collect personal information
Script
Attaches itself to document that uses macros (Example: Excel)
Macro Virus
Distribute viruses to a person’s friend by attaching itself to their contact list
Email Viruses
Ransomware – makes programs unusable and asks for money to decrypt them
Encryption Virus
Software that has malicious intents.
Malware
3 types OF Malware
Software that displays ads
Adware
3 types OF Malware
Unwanted background program → transmits personal
information, habits and tracks cookies
Spyware
3 types OF Malware
Viruses
Unsolicited emails vs. Unsolicited instant messages
Spam vs. Spim:
Small text files stored automatically on your hard drive by websites you visit so they can track visits, ads, online forms you fill in, etc.
Cookies:
When files are automatically downloaded to your file when you visit a website (1 in 1000 websites have this issue according to Google)
Drive-by Download: