Save
chapter 11 part 1
Save
Share
Learn
Content
Leaderboard
Learn
Created by
Fatima M
Visit profile
Cards (47)
Computer Security
The protection of computing systems and
data
from
unauthorized access
, change or destruction
Computers could be used for
Upholding
laws
Breaking
the laws
Upholding
laws
Computer forensics
Breaking the laws
Viruses
Identity theft
Cybercrime
Any crime using
computers
or
networks
Billions of dollars are
lost
due to
cybercrime
Majority of cybercrimes are conducted by company
insiders
Insider
crimes are covered up to avoid embarrassment
Cyberstalking
To repeatedly harm or
harass people
in a deliberate manner on
the internet
To help yourself against
cyberstalking
Limit how much
personal info
you
share
Stop
cyberbullying
Cyberbullying
Targeting children and
young adults online
, involves
humiliation
, rumors, lies, taunts or threats
Intellectual Property Theft
Software Piracy
File sharing
of
copyrighted songs
Illegal duplication
and distribution of
movies
Plagiarism
of
copyrighted text
What is stolen in cybercrime
Money
Goods
Information
Software Resources
Spoofing
Trick that
targets
to extract
secret
information
Spoofing
Making a phone call and posing as an
internet technician
, to extract sensitive data especially
passwords
Shoulder surfing
A type of
social engineering
technique used to obtain information by looking over the
victim's shoulder
Shoulder surfing
Passwords
and other
confidential
data
Phishing
The act of attempting to acquire sensitive information by masquerading as a
trustworthy
entity in an
electronic
communication
Phishing
Sending an email posing as a bank
representative
and asking to fill a
fake
bank web form
Adult sites asking users to reveal
credit
card
numbers
to prove age
Identity Theft
Extract
personal information
to commit a crime in another person's
identity
Information stolen for
identity theft
National ID
Driving License
Credit card number
Identity theft protection
Use separate
credit card
for online use
Use
secure
websites (https://)
Don't
disclose
personal info on phone
Handle email with
care
Copy your
cards
to get
replacement
in case stolen
Report Identity
theft
promptly
Malware
Malicious Software used to disrupt computer operation, gather
sensitive information
, or gain access to
private computer systems
Types of Malware
Viruses
Worms
Trojan
horses
Spyware
Ransomware
Viruses
Are attached to a file/program and spread when files are
exchanged
via email attachments or
flash drives
What viruses do when executed
1.
Damages
the
Operating system
2.
Destroys
or
steals data
3. Display annoying
pop-up messages
Viruses may be OS specific but newer types are
cross-platform
Macro viruses
Attach themselves to documents containing macros (a set of commands to
automate repetitive
tasks)
Macro
viruses
MS Office files,
Melissa
virus (
1999
)
Worms
They are
independent programs capable of reproducing themselves
Worms
Causes
memory
freezes
Spreads through the
internet
slowing it down
Famous worm
Code Red
(
2001
)
Trojan Horse
Disguise themselves as useful programs or apps, but has hidden
destructive
program (viruses)
Trojan Horses
Often posted in
shareware
Names sound like
games
or
utilities
Act as a backdoor allowing the
attacker
to control your
PC
to delete/change/share data
Trojan Horse
Time bomb
– triggered by a date or time-related event
Spyware
Gets installed and collects information without user's
knowledge
Spyware
Slows down
PC performance
Tracks keystrokes
Tracks web sites
visited
Tracks screen displays
Ransomware
Malware that locks your computer and
encrypts
data in your hard drive, demands that you pay a
ransom
to unblock the files again
How to get infected by
Ransomware
Open an
infected
email
attachment
or malicious link
Attackers usually ask you to pay the
ransom
using
digital currencies
, such as Bitcoin because it is untraceable</b>
See all 47 cards