Living in the IT Era

Subdecks (2)

Cards (225)

  • Ways to safeguard against network attacks
    1. Using firewalls
    2. Using intrusion detection software
  • Techniques to prevent unauthorized computer access and use
    Implementing safeguards
  • Safeguards against hardware theft and vandalism
    Identifying and implementing security measures
  • Ways to protect against software theft and information theft
    Implementing security protocols
  • Devices available to protect computers from system failure
    Discussing types of protective devices
  • Risks and safeguards associated with wireless communications
    Identifying risks and implementing protective measures
  • Preventing health-related disorders and injuries due to computer use
    Discussing preventive techniques
  • Issues surrounding information privacy
    Discussing privacy concerns
  • A computer security risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability
  • A cybercrime is an online or Internet-based illegal act
  • Types of computer security risks
    • Hackers
    • Crackers
    • Script Kiddies
    • Corporate Spies
    • Unethical Employees
    • Cyberextortionists
    • Cyberterrorists
  • Information transmitted over networks has a higher degree of security risk than information kept on an organization’s premises
  • Symptoms of an infected computer
    • Operating system runs much slower than usual
    • Available memory is less than expected
    • Files become corrupted
    • Screen displays unusual message or image
    • Music or unusual sound plays randomly
    • Existing programs and files disappear
    • Programs or files do not work properly
    • Unknown programs or files mysteriously appear
    • System properties change
    • Operating system does not start up
    • Operating system shuts down unexpectedly
  • A botnet is a group of compromised computers connected to a network
  • A denial of service attack (DoS attack) disrupts computer access to Internet services
  • A back door is a program or set of instructions in a program that allows users to bypass security controls
  • Spoofing is a technique intruders use to make their network or Internet transmission appear legitimate
  • A firewall is hardware and/or software that protects a network’s resources from intrusion
  • Intrusion detection software
  • Firewall
    Hardware and/or software that protects a network’s resources from intrusion
  • Intrusion detection software
    1. Analyzes all network traffic
    2. Assesses system vulnerabilities
    3. Identifies any unauthorized intrusions
    4. Notifies network administrators of suspicious behavior patterns or security breaches
  • Unauthorized access is the use of a computer or network without permission
  • Unauthorized use is the use of a computer or its data for unapproved or possibly illegal activities
  • Access controls
    • Define who can access a computer, when they can access it, and what actions they can take
    • Include two-phase processes called identification and authentication
    • Involve user name, password, and CAPTCHA
  • Possessed object
    • Any item that you must carry to gain access to a computer or computer facility
    • Often used in combination with a personal identification number (PIN)
  • Biometric device
    • Authenticates a person’s identity by translating a personal characteristic into a digital code that is compared with a digital code in a computer
  • Digital forensics
    1. The discovery, collection, and analysis of evidence found on computers and networks
    2. Used in areas such as law enforcement, criminal prosecutors, military intelligence, insurance agencies, and information security departments
  • Hardware theft
    • Hardware theft is the act of stealing computer equipment
    • Hardware vandalism is the act of defacing or destroying computer equipment
  • Software theft
    1. Occurs when someone steals software media
    2. Intentionally erases programs
    3. Illegally copies a program
    4. Illegally registers and/or activates a program
  • Software theft conditions
    • Permitted actions: Install the software on one computer, make one copy of the software, remove the software from your computer before giving it away or selling it
    • Not permitted actions: Install the software on a network, give copies to friends or colleagues while continuing to use the software, export the software, rent or lease the software
  • Copying, loaning, borrowing, renting, or distributing software can be a violation of copyright law
  • Some software requires product activation to function fully
  • Information theft
    1. Occurs when someone steals personal or confidential information
    2. Encryption is a process of converting readable data into unreadable characters to prevent unauthorized access
  • Encryption
    Converting readable data into unreadable characters to prevent unauthorized access
  • A digital signature is an encrypted code that a person, Web site, or organization attaches to an electronic message to verify the identity of the sender
  • A digital certificate is a notice that guarantees a user or a Web site is legitimate
  • Factors that can lead to system failure
    • Aging hardware
    • Natural disasters
    • Electrical power problems
    • Errors in computer programs
  • Ways to protect from system failures caused by electrical power variations
    1. Surge protectors
    2. Uninterruptible power supplies (UPS)
  • A backup is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed
  • Offsite backups
    • Stored in a location separate from the computer site