Chapter 5: Security GUIDELINES
Chapter 5: Security Notes
\*THIS GIVES YOU A GUIDELINE. DEFINITIONS AND A FEW QUESTIONS YOU SHOULD KNOW. MAYBE NOT THE EXACT QUESTION BUT IT WILL HELP TO KNOW.
**digital security risk - any event or action that could cause a loss of/damage to device hardware, software, data, info, or processing capability**
**computer crime - any illegal act involving the use of a computer**
**Cybercrime - online or Internet-based illegal act**
**Hacker - someone who accesses a computer or network illegally**
**script kiddie - someone who accesses a computer or network illegally with malicious intent, but uses a prewritten code to do so**
**Cyberextortionist - someone who demands payment to stop an attack on an organization’s technology infrastructure**
**Cyberterrorist - someone who uses the Internet/network to damage computers for political reasons**
**Cyberwarfare - use of cyber attacks against an enemy state**
**Malware - programs that act without a user’s knowledge and deliberately alter the operations of computers and mobile devices**
**Botnet - a group of compromised computers connected to a network that are used to attack other networks**
**Zombie - a compromised device, being controlled by someone other than owner**
**Bot - a program that performs a repetitive task on a network**
**Firewall - hardware/software that protects a network’s resources from intrusion by users on another network**
**biometric device - authenticates a person’s identity by translating a personal characteristic (like a fingerprint) into a digital code that is compared w/ a digital code stored in a device.**
**two-step verification - computer uses two separate methods, one after the next, to verify the identity of a user**
**software theft - when someone steals software media, intentionally erases programs, illegally registers/activates a program, or illegally copies a program**
**Encryption - the process of converting data that is readable by humans into encoded characters to prevent unauthorized access**
**digital signature - an encrypted code that a person/website/organization attaches to an e-message to verify the identity of the sender**
**digital certificate - a notice that guarantees a user/website is legitimate**
**secure site - a website that uses encryption techniques to secure its data - https**
**Cookie - small text file that a web server stores on your computer**
**Rootkit - lets someone from a remote location take full control of your device**
**Virus - A potentially damaging program that affects, or infects, a computer or mobile device negatively by altering the way the computer or device works without the user’s knowledge or permission**
**Worm - A program that copies itself repeatedly, for example in memory or on a network, using up resources and possibly shutting down the computer devices.**
**Trojan Horse - A program that hides within or looks like a legitimate program.**
**RootKit - A program that hides in a computer or mobile device and allows someone from a remote location to take full control of computer.**
**Spyware - A Program placed on a computer or mobile device without the user’s knowledge that secretly collects information about the user and then communicates the information it collects to some outside source while the user is online.**
**Adware - Program that displays an online ad in a banner, pop-up window or pop-under window on webpages, email messages, or other Internet Services**
**Unauthorized access is the use of a computer or network without permission.**
**Unauthorized use is the use of a computer or its data for unapproved or possibly illegal activities**
**Passphrase - Private combination of words, often containing mixed capitalization and punctuation, associated with a user name that allows access to certain computer resources.**
**PIN - Personal Identification Number or Passcode**
**Numeric password, either assigned by a company or selected by a user.**
**Possessed object - Any item that you must carry with you, in order to gain access to a computer or computer facility**
**Questions:**
**What are three types of firewalls: 1. Hardware Firewall 2. Software Firewall**
**3. Personal Firewall**
**What are the 6 types of malware? Definition already given**
**1. Virus**
**2. Worm**
**3. Trojan Horse**
**4. Rootkit**
**5. Spyware**
**6. Adware**
**What are 7 types of cybercrimes?**
**Hacker**
**Cracker**
**Script kiddie**
**Corporate spies**
**Unethical employees**
**Cyberextortionist**
**Cyberterrorist**
**Which is safer - passwords or passphrases? Passphrases**
**Study Kahoot and Study your Study Guide for more questions/information**
**OUTLINE OF TEST:**
**MULTIPLE CHOICE**
**TRUE/FALSE**
**OPEN ENDED**
**MALWARE VS CYBERCRIMES**
**MATCHING**