NEWComputer Science by David Watson Helen Williams-

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/20

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

21 Terms

1
New cards

What are the six types of malware summarized in Table 5.2?

  • Viruses: Programs that replicate and attach themselves to other files, aiming to corrupt or delete data.

  • Worms: Standalone malware that self-replicates without needing a host file, spreading across networks and causing congestion.

  • Trojan horses: Disguised as legitimate software but harmful, executing malicious activities on the user's system.

  • Spyware: Monitors user activity to collect sensitive information without consent.

  • Adware: Bombards users with unwanted advertisements, mainly via pop-ups, often affecting system performance.

  • Ransomware: Encrypts user data, demanding payment for the decryption key.

2
New cards

What is a virus?

  • A form of malware that can replicate itself by attaching to other files.

  • Designed to corrupt or delete files on a computer, causing data loss.

3
New cards

How do worms differ from viruses?

  • Independence: Worms are standalone and do not need to attach to host files, unlike viruses.

  • Self-replication: Worms can replicate themselves autonomously across networks.

  • Impact: They consume bandwidth and system resources as they spread.

4
New cards

What are Trojan horses usually disguised as?

  • Legitimate software applications.

  • They appear safe but perform harmful actions once installed on the user's system.

5
New cards

What does spyware do?

  • Monitors and collects information about user activities.

  • Often tracks online behavior to gather sensitive data like passwords and credit card information.

6
New cards

What is adware?

  • Software that automatically displays or downloads unwanted advertisements.

  • Usually manifests as pop-ups and can slow down system performance.

7
New cards

What is ransomware?

  • A type of malware that encrypts a user's files and data.

  • Demands a ransom payment in exchange for the decryption key to restore access.

8
New cards

What does phishing entail?

  • Sending emails that appear legitimate to deceive users.

  • Aimed at extracting personal data, such as login credentials and financial information.

9
New cards

What are some strategies to prevent phishing attacks?

  • Use anti-phishing toolbars and filters.

  • Avoid clicking on suspicious links in emails or messages.

  • Participate in security awareness training to recognize phishing attempts.

10
New cards

What is pharming?

  • Malicious code or techniques that redirect users from legitimate websites to fraudulent ones.

  • Occurs without the user's awareness, often aiming to steal personal data.

11
New cards

How can users detect and mitigate pharming attacks?

  • Utilize anti-virus and anti-malware software to detect threats.

  • Verify website authenticity by checking spelling and URL structure.

  • Look for HTTPS indicators to ensure secure connections.

12
New cards

What is social engineering?

  • A strategy that manipulates individuals into breaking security protocols.

  • Exploits human psychology rather than technical vulnerabilities.

13
New cards

What types of social engineering threats exist?

  • Phishing scams: Deceptive emails targeting personal information.

  • Baiting: Offering something enticing to lure victims.

  • Impersonation: Fake IT support calls to extract sensitive information.

  • Scareware: Misleading alerts that instill fear to trick users into malicious actions.

14
New cards

What is the purpose of access levels in computer systems?

  • Controls user permissions based on roles within an organization.

  • Restricts access to sensitive data, enhancing security.

15
New cards

What are the common factors used in authentication?

  • Something you know: Typically a password or PIN.

  • Something you have: A physical device, such as a security token or smartphone.

  • Something unique to you: Biometric data, like fingerprints or facial recognition.

16
New cards

What is two-step verification?

  • An additional security process requiring two distinct forms of authentication.

  • Enhances account security by making unauthorized access harder.

17
New cards

What distinguishes strong passwords from weak passwords?

  • Strong passwords: Combine capital letters, numbers, and special characters, making them complex and hard to crack.

  • Weak passwords: Often simple words or easily guessable sequences.

18
New cards

What role do firewalls play in cybersecurity?

  • Serve as a barrier between trusted internal networks and untrusted external networks.

  • Filter incoming and outgoing network traffic based on established security rules, preventing unauthorized access.

19
New cards

What is the function of a proxy server?

  • Acts as an intermediary for requests from clients seeking resources from other servers.

  • Filters internet traffic and helps disguise users' IP addresses for added privacy.

20
New cards

What is the SSL protocol used for?

  • Secures data transmission over the internet through encryption.

  • Ensures secure communication between clients and servers by protecting sensitive information.

21
New cards

What should you look out for in potentially phishing emails?

  • Spelling errors: Often indicative of fake communications.

  • Suspicious links: Hover over links to check their real destinations.

  • Inappropriate tone: Language that seems unusual or overly urgent.