Unit 10

Cards (29)

  • What is digital security risk?

    An event that could cause loss of or damage to a computer or mobile device's hardware, software, data, information, or processing capability
  • What is computer crime?

    Any illegal acts involving the use of a computer or related devices
  • What is malware?

    A program or file that is intentionally harmful to a computer, network or server
  • Types of malware?
    ...
    • Virus - potentially damaging computer programs, it can spread and damage files
    • Worm - can duplicate itself, which uses up resources and can shut down a computer or network
    • Trojan horse - a type of malware that disguises itself as a legitimate program
    • Payload - when a file is opened, it runs infected programs or boot the computer with infected disk in disk drive
  • Spyware
    A program placed within the user's computer/devices without their knowledge that secretly collects information about them
  • Rootkit
    A program that hides within a computer/device that allows a user from a remote location to gain full access to that computer/device
  • Ransomware
    A program that blocks/limits the use of a computer, phone or file until the user pays a specified amount of money
  • Botnet
    A network of infected devices controlled by malware
  • Adware
    A program that displays an online ad in a banner, pop-up window
  • Zombie PC
    A compromised device that becomes part of a botnet
  • Denial of service
    Disrupts a computer's access to an internet service
  • Distributed DoS
    Larger scale of DoS
  • Internet and network attacks
    • Adware
    • Ransomware
    • Rootkit
    • Spyware
    • Botnet
    • Zombie PC
    • Denial of service
    • Distributed DoS
    • Backdoor
  • Backdoor
    Program or set of instructions in a program that allows users to bypass security controls
  • What is a macro virus?
    Malicious code written into word programs
    Macros - instruction saved within an application, such as word, or spreadsheet
  • What is an antivirus?
    Software designed to detect and destroy computer viruses
  • What is virus definition?
    The binary pattern of the machine code of a particular virus
  • How does an antivirus work?
    ...
    1. Uses information to detect whether the virus has tampered any files
    2. Records the information about the files, such as size, and creation
    3. Attempts to remove any detected viruses
    4. Quarantines infected files that cannot be removed
    5. Keeps the files in a separate area of the hard disk
  • What is system failure?
    A situation where a computer/network is unable to perform its intended functions or experiences a significant disruption in its operations. Can cause loss of hardware, software or data

    Can be caused by aging hardware, natural disasters, electrical power disturbances
  • What is noise?
    Unwanted electrical signals
  • What is undervoltage?
    A drop in electrical supply
  • What is overvoltage/power surge?
    Significant increase in electrical power
  • What is a surge protector?
    Protects computers and equipment from unwanted power surges
  • What is an uninterruptible power supply (UPS)?
    A surge protector that provides power during a power loss
  • What is a digital signature?

    An encrypted code that is attached to an electronic message to verify the identity of the message sender
  • What is certificate authority (CA)?
    Entity that issues and verifies digital certificates
  • What is a secure socket layer (SSL)?
    Provides encryption of all data that passes between the client and an internet server
    Web addresses beginning with "https" indicate secure connections
  • What is backup?
    To duplicate files, programs or disks

    There is full backup and selective backup
  • What is a disaster recovery plan?
    Written plan for restoring computer operations in the event of a disaster
    • Emergency plan - steps to be taken immediately after a disaster
    • Backup plan - how backup files and equipment would be used to resume information processing
    • Recovery plan - actions to be taken to restore full information and processing operations
    • Test plan - simulates various levels of disasters and records the ability to recover