ITS CHAPTER 5 - Digital Security

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/187

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

188 Terms

1
New cards

true

T or F: Today, people rely on technology to create, store, and manage their critical information.

2
New cards

false

T or F: It is NOT important that users take measures to protect or safeguard their computers, mobile devices,, data, and programs from loss, damage, and misuse.

3
New cards

digital security risk

_____________ is any event or action that could cause a loss of or damage to a computer or mobile device hardware, software, data, information, or processing capability.

4
New cards

digital security risks

Computers and mobile devices, along with the data and programs they store, are exposed to several types of _________________.

5
New cards

true

T or F: While some breaches to digital security are accidental, many are intentional.

6
New cards

true

T or F: Other intruders indicate some evidence of their presence either by leaving a message or by deliberately altering or damaging data.

7
New cards

computer crime

Any illegal act involving the use of a computer or related devices generally is referred to as a ______________.

8
New cards

cybercrime

____________ is an online or internet-based illegal act

9
New cards

crimeware

Software used by cybercriminals sometimes is called ______________.

10
New cards

hacker

The term________ originally a complimentary word for a computer enthusiast, now has a derogatory meaning and refers to someone who accesses a computer or network illegally.

11
New cards

computer enthusiasts

The term hacker is originally a complimentary word for a _______________

12
New cards

true

T or F: Some hackers claim the intent of their security breaches is to improve security

13
New cards

cracker

___________ is also someone who accesses a computer or network illegally but has the intent of destroying data, stealing information, or other malicious actions.

14
New cards

false

T or F: Both hackers and crackers do not have computer and network skills

15
New cards

script kiddie

_________ has the same intent as a cracker but does not have the technical skills and knowledge

16
New cards

true

T or F: Script kiddies often use prewritten hacking and cracking programs to break into computers and networks

17
New cards

corporate spies

Some ___________ have excellent computer and networking skills and are hired to break into a specific computer and steal its proprietary data and information, or to help identify security risks in their own organization

18
New cards

corporate espionage

Unscrupulous companies hire corporate spies, a practice known as _____________, to gain a competitive advantage

19
New cards

unethical employees

____________ may break into their employers’ computers for a variety of reaons

20
New cards

cyberextortionist

_______________ is someone who demands payment to stop an attack on an organization’s technology infrastructure

21
New cards

cyberextortionist

These perpetrators threaten to expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization’s network if they are not paid a sum of money

22
New cards

cyberterrorist

_____________ is someone who uses the internet or network to destroy or damage computers for political reasons

23
New cards

cyberterrorist

___________ might target the nation’s air traffic control system, electricity-generating companies, or a telecommunications infrastructures.

24
New cards

cyberwarfare

__________ describes an attack whose goal ranges from disabling a government’s computer network to crippling a country

25
New cards

cyberterrorism and cyberwarfare

_____________ and ___________ usually require a team of highly skilled individuals, millions of dollars and several years of planning

26
New cards

false

T or F: Information kept on an organization’s premises has a higher degree of security risk than information transmitted over networks

27
New cards

network administrators

In an organization, ______________ usually take measures to protect a network from security risks.

28
New cards

malware

_________ short for malicious software, consists of programs that act without a user’s knowledge and deliberately alter the operations of computers and mobile devices

29
New cards

malicious software

Malware stands for __________

30
New cards

payload

___________ a destructive event or prank on a computer or mobile device delivered in a variety of ways

31
New cards

email attachments

A common way that computers and mobile devices become infected with viruses and other malware is through users opening infected _________

32
New cards

adware

A program that display an online advertisement in a banner, pop-up window, or pop-under window on webpages, email messages, or other internet services.

33
New cards

ransomware

A program that blocks or limits access to a computer, phone, or file until the user pays a specified amount of money

34
New cards

rootkit

A program that hides in a computer or mobile device and allows someone from a remote location to take full control of the computer or device

35
New cards

spyware

A program places on a computer or mobile device without the user’s knowledge that secretly collects information about the user and then communicates the information it collects to some outside source while the user is online.

36
New cards

trojan horse

A program that hides within or looks like a legitimate program. Unlike a virus or worm, a trojan horse does not replicate itself to other computers or devices.

37
New cards

virus

A potentially damaging program that affects, or infects, a computer or mobile device negatively by altering the way the computer or device works without user’s knowledge or permission

38
New cards

worm

A program that copies itself repeatedly, for example in memory or on a network, using up resources and possibly shutting down the computer, device, or network

39
New cards

true

T or F: In extreme cases, in order to remove malware from a computer or mobile device, you may need to erase, or reformat, an infected computer’s hard drive, or reset a mobile device to its factory settings.

40
New cards

false

T or F: Viruses, worms, and malware cannot be hidden in downloaded game files, mobile apps, email message attachments, and messaging software.

41
New cards

botnet

A _________ is a group of compromised computers or mobile devices connected to a network

42
New cards

zombie

A compromised computer or device is known as __________

43
New cards

zombie army

Botnet is also known as _____________

44
New cards

bot

________ is a program that performs a repetitive task on a network

45
New cards

true

T or F: You device may be a zombie if you notice an unusually high drive activity, a slower than normal internet connection, or connected devices becoming increasingly unresponsive

46
New cards

true

T or F: The chances of your computer or devices becoming part of a botnet greatly increase if your devices are not protected by an effective firewall

47
New cards

denial of service attack or DoS attack

_____________ disrupts computer access to an internet service

48
New cards

distributed DoS attack or DDoS attack

A more devastating type of DoS attack is the ___________, in which a zombie army is used to attack computers or computer networks.

49
New cards

true

T or F: DDoS attacks have been able to stop operations temporarily at numerous websites

50
New cards

hactivists

__________ those who disagree with the beliefs or actions of a particular organization, claim political anger motivates their attacks

51
New cards

back door

_________ is a program or set of instructions in a program that allow users to bypass security controls

52
New cards

back door

________ allows perpetrators to continue to access the computer remotely without the user’s knowledge

53
New cards

true

T or F: Programmers and computer repair technicians can install and build back doors during system development and troubleshooting

54
New cards

spoofing

_________ is a technique intruders use to make their network or internet transmission appear legitimate

55
New cards

IP spoofing and email spoofing

What are the two common types of spoofing schemes?

56
New cards

IP spoofing

_________ occurs when an intruder computer fools a network into believing its IP address is associated with a trusted source

57
New cards

true

T or F: Perpetrators of IP spoofing trick their victims into interacting with the phony website

58
New cards

email spoofing

________ occurs when the sender’s address or other components of an email header are altered so that it appears that the email message originated from a different sended

59
New cards

email spoofing

____________ commonly is used in virus hoaxes, spam, and phishing scams

60
New cards

online security service

__________ is a web app that evaluates your computer or mobile device to check for internet and email vulnerabilities

61
New cards

Computer Emergency Response Team Coordination Center or CERT/CC

____________ is a federally funded internet security research and development center

62
New cards

firewall

__________is hardware and/or software that protects a network’s resources from intrusion

63
New cards

true

T or F: Organizations use firewalls to protect network resources from outsiders and to restrict employees access to sensitive data such as payroll or personnel records

64
New cards

proxy server

Larger organizations often route all their communications through a ___________

65
New cards

proxy server

__________ is a server outside the organization’s network that controls which communications pass in and out of the organization’s network

66
New cards

personal firewall

Home and small/home office users often protect their computers with a _______________

67
New cards

personal firewall

_____________ is a software firewall that detects and protects a personal computer an its data from unauthorized intrusions

68
New cards

false

T or F: Both Windows and Mac operating systems do not include firewall capabilities.

69
New cards

true

T or F: Hardware firewalls stop malicious intrusions before they attempt to affect your computer or network

70
New cards

unauthorized access

__________ is the use of a computer or network without permission

71
New cards

unauthorized use

____________ is the use of a computer or its data for unapproved or possibly illegal activities

72
New cards

acceptable use policy or AUP

_________ outlines the activities for which the computer and network may and may not be used

73
New cards

disable file and printer sharing

To protect your personal computer from unauthorized intrusions, you should _________________

74
New cards

access controls

Many organizations use _________ to minimize the chance that a perpetrator intentionally may access or an employee accidentally may access confidential information on a computer, mobile device, or network

75
New cards

access control

_____________ defines who can access a computer, device, or network; when they can access it; and what actions they can take while accessing it

76
New cards

audit trail

The computer, device, or network should maintain an ____________

77
New cards

audit trail

__________ that records in a file both successful and unsuccessful access attempts

78
New cards

user name

_____________ is a unique combination of characters, such as letters of the alphabet or numbers, that identifies one specific user

79
New cards

password

_________ is a private combination of characters associated with the user name that allows access to certain computer resources.

80
New cards

user ID

user name is also called __________

81
New cards

false

T or F: One password is sufficient protection for all vital online accounts,

82
New cards

password manager or organizer

__________ is a convenient service that stores all your account information securely

83
New cards

passphrase

___________ is a private combination of words, often containing mixed capitalization and punctuation, associated with a user name that allows access to certain computer resources.

84
New cards

true

T or F: Instead of passwords, some organizations use passphrases to authenticate users.

85
New cards

personal identification number or PIN/passcode

_________ is a numeric password, either assigned by a company or selected by a user.

86
New cards

possessed object

____________ is any item that you must possess, or carry with you, in order to gain access to a computer or computer facility.

87
New cards

CAPTCHA

_______ is a program developed at Carnegie Mellon University that displays an image containing a series of distorted characters for a user to identify and enter in order to verify that user input is from humans and not computer programs

88
New cards

biometric device

___________ authenticates a person’s identity by translating a personal characteristic, such as a fingerprint, into a digital code that is compared with a digital code stored in a computer or mobile device verifying a physical or behavioral characteristic.

89
New cards

fingerprint reader or scanner

__________ captures curves and indentations of a fingerprint

90
New cards

lock screen

_________ screen that restricts access to a computer or mobile device until a user performs a certain action

91
New cards

face recognition system

_____________ captures a live face image and compares it with a stored image to determine if the person is a legitimate user

92
New cards

hand geometry system

___________ verifies identity based on the shape and size of a person’s hand

93
New cards

voice verification system

___________ compares a person’s live speech with their stored voice pattern.

94
New cards

signature verification system

_______________ recognizes the shape of your handwritten signature, as well as measures the pressure exerted and the motion used to write the signature.

95
New cards

iris recognition system

___________ uses iris recognition technology to read patterns in the iris of the eye

96
New cards

biometric payment

________ customer’s fingerprint is read by a fingerprint reader that is linked to a payment method

97
New cards

two-step verification

___________ uses two separate methods, one after the next, to verify the identity of a user.

98
New cards

digital forensics or cyberforensics

___________ is the discovery, collection, and analysis of evidence found on computers and networks.

99
New cards

law enforcement

criminal prosecutors

military intelligence

insurance agencies

information security departments

5 Areas that use digital forensics

100
New cards

software theft

__________ occurs when someone steals software media, intentionally erases programs, illegally registers and/or activates a program, or illegally copies a program.