Unit 7 – Security Flashcards

(40 cards)

1
Q

```

~~~

When personal information such as name, address, SIN, birth date, bank account numbers, and credit card information is stolen
 Can occur in-person or via computer

A

Identity Theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A person who unlawfully breaks into a computer system

A

Hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Ethical hackers, break into system to test and find vulnerabilities so they can be parched → “good guys”

A

 White-Hat Hackers:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Break into system to destroy things or for illegal gain → “bad guys”

A

Black-Hat Hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Grey-Hat Hackers

A

Illegally break into systems to expose flaws, gain attention, show expertise, or
sell security repair service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Malicious computer program that attaches itself to another program and tries to spread when files are shared between 2 computers
 Can cause programs and files to: disappear, change home pages, show strange messages, popup, play music/odd sounds, corrupt data, make programs not function, shut down your system unexpectedly

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Changes its own code to avoid detection

A

Polymorphic Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Many parasites → designed to infect many files, making it harder to find

A

Multipartite Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Temporarily erases code from their files and hides it in active memory

A

Stealth Virus:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Targets the Master Boot Record so that your computer loads it every time it starts → during start up, virus gets loaded on computer’s memory

A

Boot-Sector Viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

execute when logical conditions are met (Example: opening a file, perform an action)

A

Logic bombs:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

execute at a set date or time

A

Time bombs:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Transport themselves through networks/emails and spread on their own → usually generates lots of data traffic (slows down Internet)

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Several commands that execute without your knowledge, often used to collect personal information

A

Script

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Attaches itself to document that uses macros (Example: Excel)

A

Macro Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Distribute viruses to a person’s friend by attaching itself to their contact list

A

Email Viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Ransomware – makes programs unusable and asks for money to decrypt them

A

Encryption Virus

18
Q

Software that has malicious intents.

19
Q

3 types OF Malware

Software that displays ads

20
Q

3 types OF Malware

Unwanted background program → transmits personal
information, habits and tracks cookies

21
Q

3 types OF Malware

22
Q

Unsolicited emails vs. Unsolicited instant messages

A

Spam vs. Spim:

23
Q

Small text files stored automatically on your hard drive by websites you visit so they can track visits, ads, online forms you fill in, etc.

24
Q

When files are automatically downloaded to your file when you visit a website (1 in 1000 websites have this issue according to Google)

A

Drive-by Download:

25
Using social skills to obtain sensitive information (Example: telephone scams)
Social Engineering:
26
Creating a scenario where the person sounds legitimate so you trust them and give them information
Pretexting
27
Pretexting done in cyberspace (Example: email stating to update/confirm an account information)
Phishing
28
Programs that direct users to fake sites when they enter a legit one
Pharming
29
Makes popups, banners and other messages telling you your computer is infected (Example: directing to website selling fake removal antivirus tools)
Scareware
30
Program that closes logical ports (used by hackers) to prevent unwanted access to your computer → blocks access to logical ports AND keep computer’s network address secure
Firewall
31
# Firewall Process by which firewalls monitor incoming and outgoing packets and filter out packets sent to specific logical ports
Packet Filtering:
32
# Firewall Process where firewalls can be configured to ignore requests originating from Internet asking to access certain ports
Logical Port Blocking:
33
# Firewall Process used by firewalls to assign internal IP address on network → can’t be detected by hackers (even when they know your public IP address) o Internet Protocol Address (IP Address): every computer connected to Internet has unique address assigned to router by Internet Service Provider (ISP)
Network Address Translation (NAT):
34
Specially designed to detect viruses and protect computer/files from harm
Antivirus Software:
35
Secure networks established in public Internet infrastructure using specialized software, servers and data transmission protocols → sending data on public Internet as if it was a private network (large corporations use it to protect sensitive transmitted data between servers and connect devices)
Virtual Private Network (VPN):
36
Copies of files to replace originals if lost or damaged
Backups
37
Small device installed in computer. If notebook moves while alarm is activated, will emit 100-decibel sound.
Motion alarm:
38
Protects all electrical devices in house → installed by electricians
Whole-house surge protector:
39
Protects computer against power surge
Surge protectors:
40
Occur when too much electrical current is passed through an outlet
Power surges: