Chapter 5: Security GUIDELINES
Chapter 5: Security Notes
*THIS GIVES YOU A GUIDELINE. DEFINITIONS AND A FEW QUESTIONS YOU SHOULD KNOW. MAYBE NOT THE EXACT QUESTION BUT IT WILL HELP TO KNOW.
digital security risk - any event or action that could cause a loss of/damage to device hardware, software, data, info, or processing capability
computer crime - any illegal act involving the use of a computer
Cybercrime - online or Internet-based illegal act
Hacker - someone who accesses a computer or network illegally
script kiddie - someone who accesses a computer or network illegally with malicious intent, but uses a prewritten code to do so
Cyberextortionist - someone who demands payment to stop an attack on an organization’s technology infrastructure
Cyberterrorist - someone who uses the Internet/network to damage computers for political reasons
Cyberwarfare - use of cyber attacks against an enemy state
Malware - programs that act without a user’s knowledge and deliberately alter the operations of computers and mobile devices
Botnet - a group of compromised computers connected to a network that are used to attack other networks
Zombie - a compromised device, being controlled by someone other than owner
Bot - a program that performs a repetitive task on a network
Firewall - hardware/software that protects a network’s resources from intrusion by users on another network
biometric device - authenticates a person’s identity by translating a personal characteristic (like a fingerprint) into a digital code that is compared w/ a digital code stored in a device.
two-step verification - computer uses two separate methods, one after the next, to verify the identity of a user
software theft - when someone steals software media, intentionally erases programs, illegally registers/activates a program, or illegally copies a program
Encryption - the process of converting data that is readable by humans into encoded characters to prevent unauthorized access
digital signature - an encrypted code that a person/website/organization attaches to an e-message to verify the identity of the sender
digital certificate - a notice that guarantees a user/website is legitimate
secure site - a website that uses encryption techniques to secure its data - https
Cookie - small text file that a web server stores on your computer
Rootkit - lets someone from a remote location take full control of your device
Virus - A potentially damaging program that affects, or infects, a computer or mobile device negatively by altering the way the computer or device works without the user’s knowledge or permission
Worm - A program that copies itself repeatedly, for example in memory or on a network, using up resources and possibly shutting down the computer devices.
Trojan Horse - A program that hides within or looks like a legitimate program.
RootKit - A program that hides in a computer or mobile device and allows someone from a remote location to take full control of computer.
Spyware - A Program placed on a computer or mobile device without the user’s knowledge that secretly collects information about the user and then communicates the information it collects to some outside source while the user is online.
Adware - Program that displays an online ad in a banner, pop-up window or pop-under window on webpages, email messages, or other Internet Services
Unauthorized access is the use of a computer or network without permission.
Unauthorized use is the use of a computer or its data for unapproved or possibly illegal activities
Passphrase - Private combination of words, often containing mixed capitalization and punctuation, associated with a user name that allows access to certain computer resources.
PIN - Personal Identification Number or Passcode
Numeric password, either assigned by a company or selected by a user.
Possessed object - Any item that you must carry with you, in order to gain access to a computer or computer facility
Questions:
What are three types of firewalls: 1. Hardware Firewall 2. Software Firewall
3. Personal Firewall
What are the 6 types of malware? Definition already given
1. Virus
2. Worm
3. Trojan Horse
4. Rootkit
5. Spyware
6. Adware
What are 7 types of cybercrimes?
Hacker
Cracker
Script kiddie
Corporate spies
Unethical employees
Cyberextortionist
Cyberterrorist
Which is safer - passwords or passphrases? Passphrases
Study Kahoot and Study your Study Guide for more questions/information
OUTLINE OF TEST:
MULTIPLE CHOICE
TRUE/FALSE
OPEN ENDED
MALWARE VS CYBERCRIMES
MATCHING
Chapter 5: Security Notes
*THIS GIVES YOU A GUIDELINE. DEFINITIONS AND A FEW QUESTIONS YOU SHOULD KNOW. MAYBE NOT THE EXACT QUESTION BUT IT WILL HELP TO KNOW.
digital security risk - any event or action that could cause a loss of/damage to device hardware, software, data, info, or processing capability
computer crime - any illegal act involving the use of a computer
Cybercrime - online or Internet-based illegal act
Hacker - someone who accesses a computer or network illegally
script kiddie - someone who accesses a computer or network illegally with malicious intent, but uses a prewritten code to do so
Cyberextortionist - someone who demands payment to stop an attack on an organization’s technology infrastructure
Cyberterrorist - someone who uses the Internet/network to damage computers for political reasons
Cyberwarfare - use of cyber attacks against an enemy state
Malware - programs that act without a user’s knowledge and deliberately alter the operations of computers and mobile devices
Botnet - a group of compromised computers connected to a network that are used to attack other networks
Zombie - a compromised device, being controlled by someone other than owner
Bot - a program that performs a repetitive task on a network
Firewall - hardware/software that protects a network’s resources from intrusion by users on another network
biometric device - authenticates a person’s identity by translating a personal characteristic (like a fingerprint) into a digital code that is compared w/ a digital code stored in a device.
two-step verification - computer uses two separate methods, one after the next, to verify the identity of a user
software theft - when someone steals software media, intentionally erases programs, illegally registers/activates a program, or illegally copies a program
Encryption - the process of converting data that is readable by humans into encoded characters to prevent unauthorized access
digital signature - an encrypted code that a person/website/organization attaches to an e-message to verify the identity of the sender
digital certificate - a notice that guarantees a user/website is legitimate
secure site - a website that uses encryption techniques to secure its data - https
Cookie - small text file that a web server stores on your computer
Rootkit - lets someone from a remote location take full control of your device
Virus - A potentially damaging program that affects, or infects, a computer or mobile device negatively by altering the way the computer or device works without the user’s knowledge or permission
Worm - A program that copies itself repeatedly, for example in memory or on a network, using up resources and possibly shutting down the computer devices.
Trojan Horse - A program that hides within or looks like a legitimate program.
RootKit - A program that hides in a computer or mobile device and allows someone from a remote location to take full control of computer.
Spyware - A Program placed on a computer or mobile device without the user’s knowledge that secretly collects information about the user and then communicates the information it collects to some outside source while the user is online.
Adware - Program that displays an online ad in a banner, pop-up window or pop-under window on webpages, email messages, or other Internet Services
Unauthorized access is the use of a computer or network without permission.
Unauthorized use is the use of a computer or its data for unapproved or possibly illegal activities
Passphrase - Private combination of words, often containing mixed capitalization and punctuation, associated with a user name that allows access to certain computer resources.
PIN - Personal Identification Number or Passcode
Numeric password, either assigned by a company or selected by a user.
Possessed object - Any item that you must carry with you, in order to gain access to a computer or computer facility
Questions:
What are three types of firewalls: 1. Hardware Firewall 2. Software Firewall
3. Personal Firewall
What are the 6 types of malware? Definition already given
1. Virus
2. Worm
3. Trojan Horse
4. Rootkit
5. Spyware
6. Adware
What are 7 types of cybercrimes?
Hacker
Cracker
Script kiddie
Corporate spies
Unethical employees
Cyberextortionist
Cyberterrorist
Which is safer - passwords or passphrases? Passphrases
Study Kahoot and Study your Study Guide for more questions/information
OUTLINE OF TEST:
MULTIPLE CHOICE
TRUE/FALSE
OPEN ENDED
MALWARE VS CYBERCRIMES
MATCHING