An event that could cause loss of or damage to a computer or mobile device's hardware, software, data, information, or processing capability
What is computer crime?
Any illegal acts involving the use of a computer or related devices
What is malware?
A program or file that is intentionally harmful to a computer, network or server
Types of malware?
...
Virus - potentially damaging computer programs, it can spread and damage files
Worm - can duplicate itself, which uses up resources and can shut down a computer or network
Trojan horse - a type of malware that disguises itself as a legitimate program
Payload - when a file is opened, it runs infected programs or boot the computer with infected disk in disk drive
Spyware
A program placed within the user's computer/devices without their knowledge that secretly collects information about them
Rootkit
A program that hides within a computer/device that allows a user from a remote location to gain full access to that computer/device
Ransomware
A program that blocks/limits the use of a computer, phone or file until the user pays a specified amount of money
Botnet
A network of infected devices controlled by malware
Adware
A program that displays an online ad in a banner, pop-up window
Zombie PC
A compromised device that becomes part of a botnet
Denial of service
Disrupts a computer's access to an internet service
Distributed DoS
Larger scale of DoS
Internet and network attacks
Adware
Ransomware
Rootkit
Spyware
Botnet
Zombie PC
Denial of service
Distributed DoS
Backdoor
Backdoor
Program or set of instructions in a program that allows users to bypass security controls
What is a macro virus?
Malicious code written into word programs
Macros - instruction saved within an application, such as word, or spreadsheet
What is an antivirus?
Software designed to detect and destroy computer viruses
What is virus definition?
The binary pattern of the machine code of a particular virus
How does an antivirus work?
...
Uses information to detect whether the virus has tampered any files
Records the information about the files, such as size, and creation
Attempts to remove any detected viruses
Quarantines infected files that cannot be removed
Keeps the files in a separate area of the hard disk
What is system failure?
A situation where a computer/network is unable to perform its intended functions or experiences a significant disruption in its operations. Can cause loss of hardware, software or data
Can be caused by aging hardware, natural disasters, electrical power disturbances
What is noise?
Unwanted electrical signals
What is undervoltage?
A drop in electrical supply
What is overvoltage/power surge?
Significant increase in electrical power
What is a surge protector?
Protects computers and equipment from unwanted power surges
What is an uninterruptible power supply (UPS)?
A surge protector that provides power during a power loss
What is a digital signature?
An encrypted code that is attached to an electronic message to verify the identity of the message sender
What is certificate authority (CA)?
Entity that issues and verifies digital certificates
What is a secure socket layer (SSL)?
Provides encryption of all data that passes between the client and an internet server
Web addresses beginning with "https" indicate secure connections
What is backup?
To duplicate files, programs or disks
There is full backup and selective backup
What is a disaster recovery plan?
Written plan for restoring computer operations in the event of a disaster
Emergency plan - steps to be taken immediately after a disaster
Backup plan - how backup files and equipment would be used to resume information processing
Recovery plan - actions to be taken to restore full information and processing operations
Test plan - simulates various levels of disasters and records the ability to recover