TiA Chapter 9 Flashcards
Unlock all answers in this set
Unlock answersquestion
is any criminal action perpetrated primarily through the use of a computer
answer
cybercrime
question
individuals who use computers, networks, and the internet to perpetrate crime
answer
cybercriminals
question
a partnership between the FBI and the National WHite Collar Crime Center
answer
Internet Crime Complaint Center (IC3)
question
occurs when a thief steals your name, address, SSN, birth date, bank account, and credit card information and runs up debts in your name
answer
identity theft
question
Who identified these other methods that theives could use to obtain information? -stealing purses and wallets -stealing mail posing as bank or credit card company reps
answer
The Federal Trade Commission
question
a computer program that attatches itself to another computer program and attempts to spread to other computers when files are excahnged
answer
virus
question
What is the program that the virus attatches itself to?
answer
host
question
why are computer viruses threatening?
answer
they are engineered to evade detection
question
what is a computer virus's main purpose?
answer
to replicate itself and copy its code into as many other host files as possible
question
replicates itself into a hard drive's master boot record
answer
boot-sector virus
question
a program that executes whenever a computer boots up, ensuring the virus will be loaded into memory immediately
answer
master boot record
question
How are most boot-sector viruses transmitted?
answer
by a flash drive left in a USB port
question
is a vrius that is triggered when certain logical conditions are met-such as opening a file or starting a program
answer
logic bomb
question
a virus that is triggered by the passage of time or on a certain date
answer
time bomb
question
a famous time bomb that was set to trigger every year on March 6
answer
Michelangelo virus
question
a time bomb that spreads through email attachments
answer
BlackWorm virus
question
take advantage of file transport methods like emails or network connects to spread
answer
worm
question
What requires human interaction to spread?
answer
viruus
question
Does a virus or a worm work more independently?
answer
worm
question
a seriees of commands that is executed without your knowledge -used to perfor useful, legitimate functions on web sites, like collecting name and address information
answer
script
question
a virus that attaches itself to a documet that uses macros
answer
macro virus
question
a short series of commands that usually automates repetitive tasks
answer
macro
question
use the address book in the victim's email system to distribute the virus -once the infected document is opened it triggers the virus
answer
e-mail viruses
question
What was the first practical example of an e-mail virus?
answer
Melissa virus
question
when they infect your computer they run a program that searches for common types of data files and compresses them using a complex encryption key that renders your files unusable. -then you get a message that asks you to send money to an account
answer
encrytion viruses
question
changes its own code or periodically rewrites itself to avoid detection
answer
polymorphic virus
question
designed to infect multiple file types in an effort to fool the antivirus software that is looking for it
answer
multipartite virus
question
temporarily erase their code from the files where they reside and then hide in the active memory of the computer
answer
stealth virus
question
What are some of the ways you know your computer can be infected with a virus?
answer
-existing programs icons suddenly disappear -if you start a browser and it take you to an unusual home page -odd messages pop up -data files become corrupt -programs stop working -your system slows down
question
is specifically designed to detect viruses and protect your computer and files from harm
answer
antivirus software
question
a portion of the virus code that is unique to a particular computer virus
answer
virus signature
question
-antivirus software scans files when theyre opened or executed -if it detects a virus signature it stops the execution of the file -it also places the virus in a secure area on your hard drive.
answer
quarantining
question
the antivirus software records key attributes about files on your computer and keeps these statistics in a safe place on your hard drive
answer
inoculation
question
-viruses on websites -is common and affects almost 1 in 1000 web pages
answer
drive-by downloads
question
most commonly defined as anyone who unlawfully breaks into a computer system
answer
hacker
question
hackers who break into systems for non-malicious reasons
answer
white-hat hackers
question
the more villainous hackers
answer
black-hat hackers
question
-cross between white and black -they will often illegally break into systems merely to flaunt their expertise
answer
gray-hat hackers
question
data travels through the internet in small pieces called this
answer
packet
question
how are the packets identified?
answer
IP address
question
a computer program deployed by hackers that looks at each packet as it travels on the internet
answer
packet analyzer (sniffer)
question
a program that appears to be something useful or desirable but while it runs does something malicious in the background without your knowledge
answer
Trojan horse
question
are programs that allow hackers to gain access to your computer and take almost complete control of it without your knowledge
answer
backdoor program or rootkits
question
a computer that a hacker controls in this manner -used to launch denial-of-service attacks on other computer
answer
zombie
question
legitimate users are denied access to a computer system because a hacker is repeatedly making requests of that computer system through a computer he or she has taken over as a zombie
answer
denial-of-service (DoS) attack
question
which launches DoS attacks from more than one zombie at the same time
answer
distributed denial-of-service (DDoS) attack
question
is a large group of software programs that runs autonomously on zombie computers
answer
botnet
question
are virtual communications gateways or paths that allow a computer to organize requests for information
answer
logical ports
question
the protocol used for sending email on the internet
answer
SMTP
question
a software program or hardware device designed to protect computers from hackers
answer
firewall
question
a firewall specifically designed for home networks
answer
personal firewall
question
How do firewalls protect you?
answer
-blocking access to logical ports -keeping your computer's network address secure
question
firewalls filter out packets sent to specific logical ports
answer
packet filtering
question
firewals can be configured to ignore requests that originate from the internet asking for access to these ports
answer
logical port blocking
question
unique address code
answer
internet protocol address (IP address)
question
assign internal IP addresses on a network
answer
network address translation (NAT)
question
Virus and hacking attacks against Linux are far less likely than attacks against Windows
answer
true
question
a device that reads a unique personal characteristic such as a fingerprint or the iris pattern in your eye and converts its pattern to a digital code
answer
biometric authentication device
question
is software that has a malicious intent
answer
malware
question
What the three primary forms of malware?
answer
adware spywarre viruses
question
is software that displays sponsored advertisements in a section of your browser window or as a pop-up ad box
answer
adware
question
is an unwanted piggyback program that usually downloads with other software you want to install from the Internet -it runs in the background of your system
answer
spyware
question
monitors keystrokes with the intent of stealing passwords, login IDs, or credit card information
answer
keystroke logger (keylogger)
question
unwanted or junk email
answer
spam
question
unsolicited instant messages and are a form of spam
answer
spim
question
can catch as much as 95% of spam by checking incoming e-mail subject headers and senders' addresses against databases of known spam
answer
spam filters
question
small text files that some web sites automatically store on your computer's hard drive when you visit them
answer
cookies
question
What are the three major threats your data on your computer faces?
answer
unauthorized access tampering destruction
question
are copies of files that you can use to replace the originals if they are lost or damanged
answer
backups
question
is used to install software and usually comes on DVDs or is downloaded from the Internet
answer
program file
question
a file you have created or purched -include files such as research papers, spreadsheets, music files, movies, etc
answer
data file
question
What would you perform in order to back up all files on your computer?
answer
image backup
question
involveds backing up only files that have changed or been created since the last backup was performed
answer
incremental backup
question
means that all system, application, and data files are backed up
answer
image backup
question
What is the more efficient backup?
answer
incremental backups
question
any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information
answer
social engineering
question
involves creating a scenario that sounds legitimate enough that someone will trust you
answer
pretexting
question
lures Internet users to reveal personal information such as credit card numbers, SSN, or other sensitive information that can lead to identity theft
answer
phishing
question
when malicious code is planted on your computer that alters your browser's ability to find web addresses.
answer
pharming
question
a type of malware that is downloaded onto your computer and tries to convince you that your computer is infect with a virus or other type of malware.
answer
scareware
question
an attempt to make someone believe something that is untrue.
answer
hoax
question
when hoaxes become so well known and they are accepted by society as true events even though they are false
answer
urban legend
question
is a device that protects your computer against power surges
answer
surge protector
question
bleed off excess current during minor surges and feed it to the ground wire
answer
Metal-oxide varistors
question
function like other surge protectors but they protect all electrical devices in the house
answer
whole house surge protector
question
a device that contains surge protection equipment and a large battery -when power is interrupted, the UPS continues to send power to the attached computer from its battery
answer
uninterruptible power supply (UPS)