1/35
35 question-and-answer flashcards covering definitions, examples, and key details about Internet threats, famous worms, malware types, phishing techniques, and antivirus solutions from the Empowerment Technologies lecture.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
What are “Internet threats” in the context of Empowerment Technologies?
Dangers or risks encountered online that can damage computers, steal personal data, or harm users emotionally or financially.
Define malware.
Malicious software intended to infiltrate, damage, or disable computers and networks.
Give four common forms of malware.
Viruses, worms, Trojan horses, spyware (also adware, ransomware, etc.).
List at least four common ways malware can spread.
Spam-email attachments, malicious websites, popup ads, P2P file sharing, infected USB/storage devices.
What distinguishes a computer virus from other malware?
It self-replicates by attaching to legitimate files and spreads via Internet, local networks, or storage media.
How is a computer worm different from a virus?
A worm is self-replicating but spreads independently across networks without attaching to files.
Who created the ILOVEYOU worm?
Filipino programmers Reonel Ramones and Onel de Guzman.
On what date did the ILOVEYOU worm begin infecting computers?
5 May 2000.
What subject line and attachment name were used by the ILOVEYOU worm?
Subject: “ILOVEYOU”; Attachment: “LOVE-LETTER-FOR-YOU.TXT.vbs”.
Why did many users think the ILOVEYOU attachment was harmless?
Windows hid the .vbs extension by default, making it appear to be a normal text file.
Describe two main actions the ILOVEYOU worm performed after activation.
(1) Overwrote or hid local files (e.g., Office, image, MP3). (2) E-mailed itself to all contacts in the Outlook Address Book.
Define a Trojan horse in cybersecurity.
Malicious software disguised as a useful program that, once installed, leaves the PC vulnerable to attackers.
What is rogue security software?
A fake security program that tricks users into paying for false protection while offering no real security.
Explain spyware.
Software that secretly runs in the background to monitor user activity, often via keylogging.
What is Wi-Fi eavesdropping?
Cyber-criminals’ practice of intercepting data shared over an unencrypted Wi-Fi network.
State the purpose of keyloggers.
To record keystrokes in order to steal passwords or other sensitive information.
Differentiate hardware and software keyloggers.
Hardware keyloggers are physical devices attached to keyboards; software keyloggers are programs running on the computer.
Define adware.
A program designed to deliver advertisements, usually through persistent pop-ups.
What is spam?
Unwanted email, often from bots or advertisers, potentially used to spread malware.
What is a bot (in Internet terms)?
Automated software that performs tasks online; can be beneficial (e.g., Googlebot) or malicious (e.g., spam bot).
State the primary goal of phishing.
To acquire sensitive personal information (passwords, credit-card numbers) by directing victims to fraudulent websites.
What is spoofing in relation to phishing?
Creating fake emails, messages, or websites that imitate legitimate companies to trick users.
Define pharming.
Redirecting users from legitimate URLs to malicious sites, even when the correct address is entered.
What is hacking?
Actions taken to gain unauthorized access to a computer or network.
Describe ransomware.
Malware that restricts access to a computer or files and demands payment to remove the restriction.
What is the main function of antivirus software?
To detect, prevent, and remove cyber threats such as malware, spyware, and phishing attacks.
Name three antivirus products listed in the lecture.
Possible answers: Avast, McAfee, Bitdefender, Norton, Avira, F-Secure, Trend Micro, Webroot, ESET NOD32, G-Data, Comodo.
Which antivirus solution was described as a lightweight option?
Webroot SecureAnywhere AntiVirus.
Which antivirus brand markets itself with the slogan “Together is power”?
McAfee.
What feature does Bitdefender highlight for its Antivirus Plus product?
Smooth protection and top overall rating (✰✰).
Which antivirus software emphasizes protection against hackers, ransomware, and phishing and offers a 30-day trial?
ESET NOD32 Antivirus.
Identify one German-origin antivirus product mentioned.
G-Data Antivirus.
Which company offers a full protection suite including antivirus and firewall for $39.99/year?
Comodo Windows Antivirus.
Give two benefits of using reputable antivirus software.
(1) Real-time detection/removal of malware; (2) Protection against phishing, ransomware, and other emerging threats.
List three best practices besides antivirus software to reduce Internet threats.
Updating software regularly, using strong unique passwords, avoiding suspicious links/attachments.
Why is it important for users to stay informed about new cyber threats?
Threats continuously evolve (e.g., cryptojacking) and awareness helps users adapt defenses accordingly.