knowt logo

Chapter 5: Security GUIDELINES

Chapter 5: Security Notes

*THIS GIVES YOU A GUIDELINE. DEFINITIONS AND A FEW QUESTIONS YOU SHOULD KNOW. MAYBE NOT THE EXACT QUESTION BUT IT WILL HELP TO KNOW.

digital security risk - any event or action that could cause a loss of/damage to device hardware, software, data, info, or processing capability

computer crime - any illegal act involving the use of a computer

Cybercrime - online or Internet-based illegal act

Hacker - someone who accesses a computer or network illegally

script kiddie - someone who accesses a computer or network illegally with malicious intent, but uses a prewritten code to do so

Cyberextortionist - someone who demands payment to stop an attack on an organization’s technology infrastructure

Cyberterrorist - someone who uses the Internet/network to damage computers for political reasons

Cyberwarfare - use of cyber attacks against an enemy state

Malware - programs that act without a user’s knowledge and deliberately alter the operations of computers and mobile devices

Botnet - a group of compromised computers connected to a network that are used to attack other networks

Zombie - a compromised device, being controlled by someone other than owner

Bot - a program that performs a repetitive task on a network

Firewall - hardware/software that protects a network’s resources from intrusion by users on another network

biometric device - authenticates a person’s identity by translating a personal characteristic (like a fingerprint) into a digital code that is compared w/ a digital code stored in a device.

two-step verification - computer uses two separate methods, one after the next, to verify the identity of a user

software theft - when someone steals software media, intentionally erases programs, illegally registers/activates a program, or illegally copies a program

Encryption - the process of converting data that is readable by humans into encoded characters to prevent unauthorized access

digital signature - an encrypted code that a person/website/organization attaches to an e-message to verify the identity of the sender

digital certificate - a notice that guarantees a user/website is legitimate

secure site - a website that uses encryption techniques to secure its data - https

Cookie - small text file that a web server stores on your computer

Rootkit - lets someone from a remote location take full control of your device

Virus - A potentially damaging program that affects, or infects, a computer or mobile device negatively by altering the way the computer or device works without the user’s knowledge or permission

Worm - A program that copies itself repeatedly, for example in memory or on a network, using up resources and possibly shutting down the computer devices.

Trojan Horse - A program that hides within or looks like a legitimate program.

RootKit - A program that hides in a computer or mobile device and allows someone from a remote location to take full control of computer.

Spyware - A Program placed on a computer or mobile device without the user’s knowledge that secretly collects information about the user and then communicates the information it collects to some outside source while the user is online.

Adware - Program that displays an online ad in a banner, pop-up window or pop-under window on webpages, email messages, or other Internet Services

Unauthorized access is the use of a computer or network without permission.

Unauthorized use is the use of a computer or its data for unapproved or possibly illegal activities

Passphrase - Private combination of words, often containing mixed capitalization and punctuation, associated with a user name that allows access to certain computer resources.

PIN - Personal Identification Number or Passcode

Numeric password, either assigned by a company or selected by a user.

Possessed object - Any item that you must carry with you, in order to gain access to a computer or computer facility

Questions:

What are three types of firewalls: 1. Hardware Firewall 2. Software Firewall

3. Personal Firewall

What are the 6 types of malware? Definition already given

1. Virus

2. Worm

3. Trojan Horse

4. Rootkit

5. Spyware

6. Adware

What are 7 types of cybercrimes?

Hacker

Cracker

Script kiddie

Corporate spies

Unethical employees

Cyberextortionist

Cyberterrorist

Which is safer - passwords or passphrases? Passphrases

Study Kahoot and Study your Study Guide for more questions/information

OUTLINE OF TEST:

MULTIPLE CHOICE

TRUE/FALSE

OPEN ENDED

MALWARE VS CYBERCRIMES

MATCHING

Chapter 5: Security GUIDELINES

Chapter 5: Security Notes

*THIS GIVES YOU A GUIDELINE. DEFINITIONS AND A FEW QUESTIONS YOU SHOULD KNOW. MAYBE NOT THE EXACT QUESTION BUT IT WILL HELP TO KNOW.

digital security risk - any event or action that could cause a loss of/damage to device hardware, software, data, info, or processing capability

computer crime - any illegal act involving the use of a computer

Cybercrime - online or Internet-based illegal act

Hacker - someone who accesses a computer or network illegally

script kiddie - someone who accesses a computer or network illegally with malicious intent, but uses a prewritten code to do so

Cyberextortionist - someone who demands payment to stop an attack on an organization’s technology infrastructure

Cyberterrorist - someone who uses the Internet/network to damage computers for political reasons

Cyberwarfare - use of cyber attacks against an enemy state

Malware - programs that act without a user’s knowledge and deliberately alter the operations of computers and mobile devices

Botnet - a group of compromised computers connected to a network that are used to attack other networks

Zombie - a compromised device, being controlled by someone other than owner

Bot - a program that performs a repetitive task on a network

Firewall - hardware/software that protects a network’s resources from intrusion by users on another network

biometric device - authenticates a person’s identity by translating a personal characteristic (like a fingerprint) into a digital code that is compared w/ a digital code stored in a device.

two-step verification - computer uses two separate methods, one after the next, to verify the identity of a user

software theft - when someone steals software media, intentionally erases programs, illegally registers/activates a program, or illegally copies a program

Encryption - the process of converting data that is readable by humans into encoded characters to prevent unauthorized access

digital signature - an encrypted code that a person/website/organization attaches to an e-message to verify the identity of the sender

digital certificate - a notice that guarantees a user/website is legitimate

secure site - a website that uses encryption techniques to secure its data - https

Cookie - small text file that a web server stores on your computer

Rootkit - lets someone from a remote location take full control of your device

Virus - A potentially damaging program that affects, or infects, a computer or mobile device negatively by altering the way the computer or device works without the user’s knowledge or permission

Worm - A program that copies itself repeatedly, for example in memory or on a network, using up resources and possibly shutting down the computer devices.

Trojan Horse - A program that hides within or looks like a legitimate program.

RootKit - A program that hides in a computer or mobile device and allows someone from a remote location to take full control of computer.

Spyware - A Program placed on a computer or mobile device without the user’s knowledge that secretly collects information about the user and then communicates the information it collects to some outside source while the user is online.

Adware - Program that displays an online ad in a banner, pop-up window or pop-under window on webpages, email messages, or other Internet Services

Unauthorized access is the use of a computer or network without permission.

Unauthorized use is the use of a computer or its data for unapproved or possibly illegal activities

Passphrase - Private combination of words, often containing mixed capitalization and punctuation, associated with a user name that allows access to certain computer resources.

PIN - Personal Identification Number or Passcode

Numeric password, either assigned by a company or selected by a user.

Possessed object - Any item that you must carry with you, in order to gain access to a computer or computer facility

Questions:

What are three types of firewalls: 1. Hardware Firewall 2. Software Firewall

3. Personal Firewall

What are the 6 types of malware? Definition already given

1. Virus

2. Worm

3. Trojan Horse

4. Rootkit

5. Spyware

6. Adware

What are 7 types of cybercrimes?

Hacker

Cracker

Script kiddie

Corporate spies

Unethical employees

Cyberextortionist

Cyberterrorist

Which is safer - passwords or passphrases? Passphrases

Study Kahoot and Study your Study Guide for more questions/information

OUTLINE OF TEST:

MULTIPLE CHOICE

TRUE/FALSE

OPEN ENDED

MALWARE VS CYBERCRIMES

MATCHING

robot