1/57
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Central Processing Unit (CPU)
a complex integrated circuit consisting of millions of electronic parts and is primarily responsible for covering input (data) into meaningful output (information)
Bus
data travels in and out of the CPU through a ______.
Computer Memory
responsible for holding data and programs as they are being processed by the CPU
Random Access Memory (RAM)
temporarily store open apps and document data while a computer is on
- connected to the CPU
-physical memory
Volatile Memory
losing contents
Involatile Memory
not losing contents
Read-only memory (ROM)
the portion of a computer's primary storage that does not lose its contents when one switches off the power
- Power-on self test (POST)
- Firmware (permanently embedded In electronic hardware for basic functions)
Virtual Memory
area of the hard disk that stores overflow data from RAM
Google Drive, Microsoft OneDrive, Dropbox
3 places to store electronic files
1. check for ideal location
2. check for necessary components
3. ensure that it is free from damage
4. connect all components and accessories then connect power
5. turn on computer, follow on-screen steps
5 Steps for installing computer hardware
peripherals
An input device, output device, or secondary storage device that is not part of the central processing unit (CPU)
plug-and-play
a technology that allows new hardware components to be automatically detected and configured by the operating system without requiring manual intervention from the user, simplifying the process of adding peripherals like USB drives, webcams, and printers.
device driver
A software program that provides the instructions your computer needs to communicate with a device, such as a scanner.
- Without these, your operating system wouldn't know how to send commands or receive data from your hardware, effectively making the hardware unusable.
1. clean display with damp cloth
2. clean keyboard with compressed air
3. keep air vent free of dust and debris
4. keep environment temperature controlled
4 Steps to Maintain Computer Hardware (pt 1)
1. Protect from power fluctuations (using a surge suppressor and uninterruptible power supply)
2. keep free space on hard drive
3. keep away from from clutter/dust
4. regularly back up data
5. use protective cases for media
5 steps to Maintain Computer Hardware (pt 2)
uniterruptible power supply (UPS)
A battery power source that provides electric current during a power outage. Ex: Backup power generator
surge suppressor
electrical device inserted in a power line to protect equipment from sudden fluctuations in current
risk
the possibility something might occur that results in an injury or a loss
Information, Environment, and Health
What are three main types of hazards from computers?
informational risk
data and programs, comes from attackers who eat to steal data
environmental risk
toxic electronic components of computers and other digital devices that are exposed when devices are discarded
health risk
eye strain, poor posture when using devices, and muscle fatigue from keyboard typing
1. Script kitties/kiddies
2. hactivists
3. cyberterrorists
4. nation state actors
5. insiders
5 different types of Attackers
script kiddies
Individuals who want to break into computers to create damage, yet lack the advanced knowledge of computers and networks needed to do so.
hactivists
Attackers who are strongly motivated by principles or beliefs.
cyberterrorists
seek to cause harm to people or to destroy critical systems or information and use the internet as a weapon of mass destruction
nation state actors
Highly skilled attackers that are sponsored by governments to carry out cyber espionage, sabotage, or cyber warfare against other nation states or specific targets in a variety of industries
insiders
legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident
1. online banking
2. e-commerce shopping
3. fake websites
4. social media sites
5. data mining
5 different types of online risks
data mining
the process of analyzing data to extract information not offered by the raw data alone
1. virus
2. worm
3. trojan
4. ransomware
5. address spoofing
5 different types of malware
virus
A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
worm
a software program capable of reproducing itself that can spread from one computer to the next over a network
trojan
A program disguised as a harmless application that actually produces harmful results.
ransomware
Software that encrypts programs and data until a ransom is paid to remove it.
two main types are blocker and encrypting
address spoofing
changes an originating address or a destination address to redirect the flow of data between two parties
social engineering
attacks that attempts to trick the victim into giving valuable information to the attacker
phishing
An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information
hoax
a fake message, often an email, that claims a nonexistent computer virus or a severe threat is spreading rapidly and urges users to take specific actions to protect themselves, such as deleting files or forwarding the message to others.
Spam
unwanted e-mail (usually of a commercial nature sent out in bulk)
1. reading wireless transmissions
2. viewing or stealing computer data
3. injecting malware
4. downloading harmful content
What are some wireless network risks?
1. only connect to an approved wireless network in public
2. limit the type of activity you do on public networks to simple web surfing or watching online videos
3. configure routers for a high level of security
What are some wireless network precautions?
strong password
a longer combination of letters, number, symbols
true
true or false: a longer password is always more secure than a shorter password regardless of complexity
15-20 characters
What is the minimum character length that security experts recommend in order to have a secure password?
false
true or false: we should use passwords that consist of dictionary/phonetic words
1. do not repeat characters or use sequences (abc, 123)
2. do not use birthdays, family member/ pet names, addresses or any personal information
2 password "don'ts"
password manager
a software application that stores and organizes encrypted passwords for a user and is accessed using a single, strong master password
encryption
the process of scrambling information so it cannot be read unless the user possesses the "key" to unlock it (decryption).
the key must be kept secure.
data-at-rest (hard drive) or data-in-transit (internet)
What can encryption be applied to?
digital certificate
a technology used to verify a user's identity and key that has been "signed" by a trusted third party
1. cookies
2. scripting
3. plug-ins
4. pop-ups
5. clear browsing data
6. plug-in validation
6 ways to configure browser security
cookies
small computer programs left behind on your computer when you visit a website
scripting
Simple programming that can be included in web pages to make them more interactive or dynamic.
plug-ins
Downloadable software extensions that add new features to a browser
pop-ups
Ads that appear when certain sites are accessed
plug-in validation
examines the plug-ins that are being used and alert the user to any out-of-date or known vulnerable plug-ins.
clear browsing data
The process of removing all cookies, browsing history, and other data tracked by a web browser.