module 9

Cards (70)

  • Types of network attacks
    • Hackers
    • Crackers
    • Script Kiddies
    • Corporate Spies
    • Unethical Employees
    • Cyberextortionists
    • Cyberterrorists
  • Computer security risk
    • Any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability
  • Cybercrime
    An online or Internet-based illegal act
  • Information transmitted over networks has a higher degree of security risk than information kept on an organization's premises
  • Computer virus
    Affects a computer negatively by altering the way the computer works
  • Worm
    Copies itself repeatedly, using up resources and possibly shutting down the computer or network
  • Trojan horse
    A malicious program that hides within or looks like a legitimate program
  • Rootkit
    Program that hides in a computer and allows someone from a remote location to take full control
  • Symptoms of an infected computer
    • Operating system runs much slower than usual
    • Available memory is less than expected
    • Files become corrupted
    • Screen displays unusual message or image
    • Music or unusual sound plays randomly
    • Existing programs and files disappear
    • Programs or files do not work properly
    • Unknown programs or files mysteriously appear
    • System properties change
    • Operating system does not start up
    • Operating system shuts down unexpectedly
  • Precautions users can take to protect their home and work computers and mobile devices
    • Install antivirus software
    • Keep software up-to-date
    • Use a firewall
    • Be cautious when opening email attachments
    • Be cautious when downloading files from the Internet
    • Back up data regularly
  • Botnet
    A group of compromised computers connected to a network
  • Zombie
    A compromised computer in a botnet
  • Denial of service attack (DoS attack)

    Disrupts computer access to Internet services
  • Back door
    A program or set of instructions in a program that allow users to bypass security controls
  • Spoofing
    A technique intruders use to make their network or Internet transmission appear legitimate
  • Firewall
    Hardware and/or software that protects a network's resources from intrusion
  • Intrusion detection software
    • Analyzes all network traffic
    • Assesses system vulnerabilities
    • Identifies any unauthorized intrusions
    • Notifies network administrators of suspicious behavior patterns or security breaches
  • Unauthorized access
    The use of a computer or network without permission
  • Unauthorized use
    The use of a computer or its data for unapproved or possibly illegal activities
  • Access controls
    • Define who can access a computer, when they can access it, and what actions they can take
    • Two-phase processes called identification and authentication
    • User name
    • Password
    • CAPTCHA
  • Possessed object
    Any item that you must carry to gain access to a computer or computer facility
  • Biometric device
    Authenticates a person's identity by translating a personal characteristic into a digital code that is compared with a digital code in a computer
  • Digital forensics
    The discovery, collection, and analysis of evidence found on computers and networks
  • Areas that use digital forensics
    • Law enforcement
    • Criminal prosecutors
    • Military intelligence
    • Insurance agencies
    • Information security departments
  • Hardware theft
    The act of stealing computer equipment
  • Hardware vandalism
    The act of defacing or destroying computer equipment
  • Security measures to reduce hardware theft and vandalism
    • Physical access controls
    • Alarm systems
    • Cables to lock equipment
    • Real time location system
    • Passwords, possessed objects, and biometrics
  • Software theft
    When someone steals software media, intentionally erases programs, illegally copies a program, or illegally registers and/or activates a program
  • Single-user license agreement
    • Permitted to: Install the software on one computer, make one copy of the software, remove the software from your computer before giving it away or selling it
    Not permitted to: Install the software on a network, give copies to friends or colleagues while continuing to use the software, export the software, rent or lease the software
  • Copying, loaning, borrowing, renting, or distributing software can be a violation of copyright law
  • Some software requires product activation to function fully
  • Information theft
    When someone steals personal or confidential information
  • Encryption
    A process of converting readable data into unreadable characters to prevent unauthorized access
  • Digital signature
    An encrypted code that a person, Web site, or organization attaches to an electronic message to verify the identity of the sender
  • Digital certificate
    A notice that guarantees a user or a Web site is legitimate, issued by a certificate authority
  • System failure
    The prolonged malfunction of a computer
  • Factors that can lead to system failure
    • Aging hardware
    • Natural disasters
    • Electrical power problems
    • Errors in computer programs
  • Factors that can lead to system failure
    • Aging hardware
    • Natural disasters
    • Electrical power problems
    • Errors in computer programs
  • Surge protectors
    A way to protect from system failures caused by electrical power variations
  • Uninterruptable power supply (UPS)

    A way to protect from system failures caused by electrical power variations