ifs module 5

Cards (86)

  • Digital security risk
    Any event or action that could cause a loss of or damage to a computer or mobile device hardware, software, data, information, or processing capability
  • Computer crime

    Any illegal act involving the use of a computer or related devices
  • Cybercrime
    An online or Internet-based illegal act
  • Types of cybercriminals
    • Hacker
    • Cracker
    • Script kiddie
    • Corporate spies
    • Unethical employees
    • Cyberextortionist
    • Cyberterrorist
  • Information transmitted over networks
    • Has a higher degree of security risk than information kept on an organization's premises
  • Malware
    Programs that act without a user's knowledge and deliberately alter the operations of computers and mobile devices
  • Common types of malware
    • Adware
    • Ransomware
    • Rootkit
    • Spyware
    • Trojan horse
    • Virus
    • Worm
  • Botnet
    A group of compromised computers or mobile devices connected to a network
  • Zombie
    A compromised computer or device in a botnet
  • Denial of service attack (DoS attack)
    Disrupts computer access to an Internet service
  • Distributed DoS attack (DDoS attack)

    A type of denial of service attack
  • Back door
    A program or set of instructions in a program that allow users to bypass security controls
  • Spoofing
    A technique intruders use to make their network or Internet transmission appear legitimate
  • Firewall
    Hardware and/or software that protects a network's resources from intrusion
  • Acceptable use policy
    • An organizational measure to help prevent unauthorized access and use
  • Disabling file and printer sharing
    • An organizational measure to help prevent unauthorized access and use
  • Access controls
    Define who can access a computer, device, or network; when they can access it; and what actions they can take while accessing it
  • Audit trail
    A record of both successful and unsuccessful access attempts to a computer, device, or network
  • Passphrase
    A private combination of words, often containing mixed capitalization and punctuation, associated with a user name that allows access to certain computer resources
  • PIN (personal identification number)

    A numeric password, either assigned by a company or selected by a user, that allows access to certain computer resources
  • Possessed object
    An item that you must possess, or carry with you, in order to gain access to a computer or computer facility
  • Biometric device
    Authenticates a person's identity by translating a personal characteristic into a digital code that is compared with a digital code stored in a computer or mobile device verifying a physical or behavioral characteristic
  • Two-step verification
    Uses two separate methods, one after the next, to verify the identity of a user
  • Digital forensics
    The discovery, collection, and analysis of evidence found on computers and networks
  • Software theft
    Occurs when someone steals software media, intentionally erases programs, illegally registers and/or activates a program, or illegally copies a program
  • Software activation process
    • Ensures the software is not installed on more computers than legally licensed
  • License agreement
    The right to use software
  • Typical conditions of a single-user license agreement
    • You can install the software on only one computer or device, make one copy of the software as a backup, give or sell the software to another individual but only if the software is removed from the user's computer first
    You cannot install the software on a network, give copies to friends and colleagues, export the software, or rent or lease the software
  • Information theft
    Occurs when someone steals personal or confidential information
  • Encryption
    A process of converting data that is readable by humans into encoded characters to prevent unauthorized access
  • Digital signature
    An encrypted code that a person, website, or organization attaches to an electronic message to verify the identity of the message sender
  • Digital certificate
    A notice that guarantees a user or a website is legitimate
  • Secure site

    A website that uses encryption techniques to secure its data
  • Hardware theft
    The act of stealing digital equipment
  • Hardware vandalism
    Defacing or destroying digital equipment
  • Safeguards against hardware theft and vandalism
    • Physical access controls (i.e., locked doors and windows)
    Alarm system
    Physical security devices (i.e., cables and locks)
    Devices-tracking app
  • Safeguards against hardware failure
    • Surge protector
    Uninterruptible power supply (UPS)
    Duplicate components or duplicate computers
    Fault-tolerant computer
  • Backup
    A duplicate of a file, program, or media that can be used if the original is lost, damaged, or destroyed
  • Off-site backups

    Backups stored in a location separate from the computer or mobile device site
  • Categories of backups
    • Full
    Differential
    Incremental
    Selective
    Continuous data protection
    Cloud