Computer Security Chapter 12

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What does the term 'malware' refer to?

  • Hardware damage
  • Network configuration
  • Internet speed issues
  • Malicious software (correct)

How does a computer virus typically infect another computer?

  • Via system updates
  • By attaching itself to documents or software (correct)
  • By accessing the internet directly
  • Through direct network connections

What is a characteristic of a Trojan horse?

  • It behaves like a useful program but contains malicious code (correct)
  • It replicates itself to other systems
  • It deletes files on the computer
  • It can only be installed through USB drives

What is the primary function of worms in malware?

<p>To slow or disrupt network operations (C)</p> Signup and view all the answers

What should individuals regularly do to protect their computers from malware?

<p>Use antivirus and update it regularly (B)</p> Signup and view all the answers

What is the main goal of phishing attacks?

<p>To convince users to share personal information (A)</p> Signup and view all the answers

Which type of malware is designed to replicate and spread automatically?

<p>Worm (D)</p> Signup and view all the answers

Why do organizations often have written security policies regarding software installation?

<p>To prevent unauthorized software installations (C)</p> Signup and view all the answers

What are smart watches designed to combine?

<p>The functions of a watch and some mobile device functions (D)</p> Signup and view all the answers

Which feature is common in most smart watches?

<p>Touchscreen display (D)</p> Signup and view all the answers

What is the primary purpose of fitness monitors?

<p>To track daily activity and body metrics (C)</p> Signup and view all the answers

How do smart headsets primarily connect to the internet?

<p>By connecting to a smartphone (D)</p> Signup and view all the answers

What type of devices are considered wearable devices?

<p>Smartwatches and fitness trackers (B)</p> Signup and view all the answers

What is a unique feature of smart headsets?

<p>They have a display visible to the wearer (D)</p> Signup and view all the answers

Which statement is true about the functionality of laptops and mobile devices?

<p>They can operate on battery power and are lightweight. (A)</p> Signup and view all the answers

Which of the following can fitness monitors do?

<p>Upload activity data for review (B)</p> Signup and view all the answers

What is the primary function of antivirus protection?

<p>To continuously monitor for viruses (A)</p> Signup and view all the answers

Which type of protection warns users about unsafe programs before they are installed?

<p>Trusted / untrusted sources protection (D)</p> Signup and view all the answers

What action should you take when encountering a suspicious warning window?

<p>Close the tab or browser (D)</p> Signup and view all the answers

Why is it recommended to run only one malware protection program at a time?

<p>Multiple programs can conflict with each other (A)</p> Signup and view all the answers

What is the role of phishing protection software?

<p>To block IP addresses of known phishing sites (D)</p> Signup and view all the answers

What might a rogue antivirus product do to trick users?

<p>Pretend to clean an actually infected computer (B)</p> Signup and view all the answers

What is a common method to handle a persistent malicious warning window?

<p>Press ALT+F4 to close the window (D)</p> Signup and view all the answers

What type of software actively searches for programs that display advertisements?

<p>Adware protection (B)</p> Signup and view all the answers

What action is used to zoom in on objects on a mobile device?

<p>Touch the screen with two fingers and spread them apart (D)</p> Signup and view all the answers

What is the purpose of a proximity sensor in a smartphone?

<p>To turn off the touchscreen when near the user's ear (B)</p> Signup and view all the answers

What feature distinguishes laptops from desktop computers?

<p>Laptops are typically more lightweight. (A)</p> Signup and view all the answers

Which of the following is NOT a common input device found in laptops?

<p>Monitor (B)</p> Signup and view all the answers

Which of the following describes accessories for mobile devices?

<p>They enhance the user experience but are not necessary. (C)</p> Signup and view all the answers

What kind of power source do laptops use?

<p>Either battery or AC power adapter (C)</p> Signup and view all the answers

What can protective covers for mobile devices protect against?

<p>Water damage and physical damage (B)</p> Signup and view all the answers

What is the primary function of external batteries or portable chargers?

<p>To provide extra power for mobile devices while on the go (D)</p> Signup and view all the answers

Where are the LEDs indicating device status commonly located on a laptop?

<p>Below the display screen or above the keyboard (C)</p> Signup and view all the answers

What is a defining characteristic of mobile devices compared to laptops?

<p>They have a touchscreen for input. (A)</p> Signup and view all the answers

What feature do most docking stations have?

<p>They allow easy connection and act as a charger. (D)</p> Signup and view all the answers

How does the CPU architecture of mobile devices differ from that of laptops?

<p>Mobile devices have a reduced instruction set. (A)</p> Signup and view all the answers

What is a primary benefit of using headsets or ear buds?

<p>They allow for hands-free phone conversations. (B)</p> Signup and view all the answers

Which of the following accessories can be used for processing credit card payments?

<p>Credit card readers (B)</p> Signup and view all the answers

Which of the following is a built-in input device typically found on laptops?

<p>Pointing stick (A)</p> Signup and view all the answers

What is the primary reason for the increasing popularity of laptops and mobile devices?

<p>Their size and weight have decreased, enhancing portability. (B)</p> Signup and view all the answers

What is spear phishing?

<p>A phishing attack targeted at a specific individual or organization. (C)</p> Signup and view all the answers

What is a primary characteristic of spam?

<p>It is unsolicited email often used for advertising. (C)</p> Signup and view all the answers

Why are organizations encouraged to educate users about phishing?

<p>Users may frequently be targeted by attackers. (B)</p> Signup and view all the answers

What should a user do if they are unsure about a request for personal information?

<p>Contact the organization by mail or phone for verification. (D)</p> Signup and view all the answers

What usually causes the bulk sending of spam emails?

<p>Multiple computers infected by viruses or worms. (D)</p> Signup and view all the answers

What is an effective measure against spam?

<p>Installing software that automatically filters spam. (D)</p> Signup and view all the answers

What does social engineering involve?

<p>Deceiving individuals into revealing sensitive information. (B)</p> Signup and view all the answers

What is a common misconception about email attachments?

<p>Attachments from trusted contacts are safe. (B)</p> Signup and view all the answers

Flashcards

Laptop

A compact, portable computer with built-in features like keyboard, touchpad, and webcam.

Laptop power adapter

An external power source for laptops, allowing them to run without needing a power outlet. It plugs into the laptop's power port.

Touchpad

A small, sensitive surface on a laptop that controls the cursor on the screen. It uses multi-touch gestures for navigation and commands.

Pointing stick

A small, stick-like pointing device embedded in the keyboard. It can be used to control the cursor on the screen.

Signup and view all the flashcards

LEDs in laptops

Integrated LEDs on a laptop that indicate the status of different components like power, Wi-Fi, or battery life.

Signup and view all the flashcards

Mobile device

Any hand-held, lightweight device with a touchscreen interface. They use an operating system to run apps, games, and multimedia.

Signup and view all the flashcards

Mobile device operating system

The software that manages the basic functions of a mobile device. It allows users to run applications, access data, and interact with the device.

Signup and view all the flashcards

Mobile device CPU architecture

A specific type of processor in mobile devices that is optimized for low power consumption and efficiency.

Signup and view all the flashcards

What are game pads?

Peripheral devices used for playing video games.

Signup and view all the flashcards

What are wearable devices?

Mobile devices that are worn like clothing or accessories.

Signup and view all the flashcards

What are smart watches?

Watches that combine watch functions with functions of a mobile device.

Signup and view all the flashcards

What are fitness monitors?

Devices worn on the wrist or clipped to clothing, used for tracking activity.

Signup and view all the flashcards

What are smart headsets?

Headsets worn like eye glasses, with a small screen for notifications and communication.

Signup and view all the flashcards

What is a key characteristic of laptops and mobile devices?

Laptop and mobile devices can operate without plugging in.

Signup and view all the flashcards

How do mobile devices increase storage?

Devices that can store more data through memory card readers.

Signup and view all the flashcards

What is an example of a category of mobile devices?

Smartwatches, fitness monitors, and smart headsets are all examples of this category of mobile devices.

Signup and view all the flashcards

Spread Zoom

A feature that allows users to zoom in on objects like photographs, maps, and text by spreading two fingers on the screen.

Signup and view all the flashcards

Proximity Sensor

A sensor that detects proximity, often used to turn off the touchscreen when a phone is brought to the ear and turn it back on when pulled away.

Signup and view all the flashcards

Mobile Device Accessories

Accessories that can enhance the user experience of mobile devices but are not essential for their basic functionality.

Signup and view all the flashcards

Protective Covers for Mobile Devices

Cases and covers that protect mobile devices from physical damage during use or transport.

Signup and view all the flashcards

External Batteries/Portable Chargers

External power sources for mobile devices, such as batteries and chargers, that provide additional power while on the go.

Signup and view all the flashcards

Docking Stations

Devices that allow mobile devices to easily connect to other devices, often also providing charging capabilities.

Signup and view all the flashcards

Headsets/Ear Buds

Audio accessories that allow users to privately listen to audio output, sometimes with a microphone for hands-free calls.

Signup and view all the flashcards

Speakers for Mobile Devices

Audio devices used to amplify sound output from mobile devices, available in various colors, shapes, and sizes.

Signup and view all the flashcards

Phishing

A type of attack that tricks users into providing sensitive information, often impersonating a legitimate organization.

Signup and view all the flashcards

Spear Phishing

A targeted phishing attack aimed at a specific individual or organization.

Signup and view all the flashcards

Spam

Unsolicited email, often used for advertising or spreading malware.

Signup and view all the flashcards

Social Engineering

Using deception and manipulation to gain unauthorized access to systems or information by tricking people into revealing passwords or granting access.

Signup and view all the flashcards

Worm

A harmful program that replicates itself and spreads to other computers.

Signup and view all the flashcards

Virus

A program that can replicate itself and spread to other computers, often requiring user interaction to do so.

Signup and view all the flashcards

Antivirus Software

A type of software designed to detect and remove malware from computers.

Signup and view all the flashcards

Email Filtering

The process of filtering unwanted emails, often preventing spam and malicious content from reaching the recipient's inbox.

Signup and view all the flashcards

Antivirus Protection

Software that actively monitors for and protects against malware threats like viruses, worms, and Trojans.

Signup and view all the flashcards

Adware Protection

Software that detects and blocks programs that display unwanted advertisements on your computer.

Signup and view all the flashcards

Phishing Protection

Software that protects against phishing attacks, which are attempts to steal personal information through fraudulent websites or emails.

Signup and view all the flashcards

Spyware Protection

Software that scans for and removes spyware, which secretly collects information about your computer usage and browsing history.

Signup and view all the flashcards

Trusted/Untrusted Source Protection

Software that warns you about potential threats, such as unsafe programs or websites, before they are installed or accessed.

Signup and view all the flashcards

Rogue Antivirus

A deceptive program that pretends to be legitimate antivirus software but actually installs malware.

Signup and view all the flashcards

Computer Security

The practice of taking preventive measures to protect computer equipment, networks, and data from threats.

Signup and view all the flashcards

Malware

A software that is designed to harm or disrupt computer systems without the user's knowledge or consent.

Signup and view all the flashcards

Trojan Horse

A type of malware disguised as a legitimate program, containing harmful code.

Signup and view all the flashcards

Computer Virus

A type of malware that attaches itself to other files, executing and spreading when the file is accessed.

Signup and view all the flashcards

Browser Redirection

The act of manipulating web browsers to redirect users to unintended websites.

Signup and view all the flashcards

Security Policy

A written document outlining rules and guidelines for maintaining system security within an organization.

Signup and view all the flashcards

Study Notes

Chapter 12: Security

  • This chapter reviews types of attacks threatening computer security.
  • Technicians are responsible for data and equipment security.
  • Understanding physical and data threats is crucial for protection.
  • Physical threats involve stealing, damaging, or destroying equipment (e.g., servers, wiring).
  • Data threats involve removing, corrupting, denying access, or stealing information.

Types of Security Threats

  • Malware: software designed for malicious activities.
  • Malware is often installed without user knowledge and can change computer configurations or redirect web browsers.
  • Malware can collect information without consent.
  • Virus: a form of malware that spreads via files, transfers, emails, and instant messages.
  • Worm: self-replicating malware damaging networks.
  • Trojan horse: malware disguised as a useful program.

Phishing

  • Phishing involves deceitful emails, calls, or texts to trick users into providing personal or financial information.
  • Attackers often impersonate legitimate organizations like banks.

Spam

  • Unsolicited email often used for advertising, harmful links, or malware distribution.
  • Spam is filtered by ISPs and antivirus software.
  • Opening suspicious attachments can spread malware.

Social Engineering

  • Attackers manipulate individuals to gain access to networks or equipment.
  • Employees should be cautious and verify requests before divulging information.
  • Precautions include not giving out login details, securing computer areas, and verifying the identity of visitors.

Security Procedures

  • Security policy: a set of objectives ensuring network, data, and system security.
  • Security policies are dynamic, adapting to changing technologies, businesses, and employee needs.
  • Security policy is usually created and managed by organizational management and the IT staff.
  • Usernames and passwords: should adhere to a standard naming convention.
  • Passwords are crucial for security and should not be revealed.

Protection Against Malicious Software

  • Malware protection programs: include antivirus, anti-spyware, and anti-adware software.
  • Regularly updating malware protection software is essential.
  • Malware programs continuously monitor for malware.
  • Running multiple malware protection programs simultaneously is discouraged.
  • Rogue antivirus programs are malicious software disguised as security tools. Be cautious about downloading and installing unverified programs.
  • Organizations should scan for threats regularly to ensure systems are secure.

Summary

  • Security threats can come from inside or outside the organization.
  • Viruses, worms, and Trojans can compromise data or physical equipment.
  • Develop security plans to protect data and physical equipment.
  • Keep operating systems and applications up-to-date.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Antivirus Software and Malware Types
10 questions
Malware Overview and Types
43 questions

Malware Overview and Types

StraightforwardCombinatorics avatar
StraightforwardCombinatorics
Security and Ethics Quiz
13 questions

Security and Ethics Quiz

DecentHeliotrope5034 avatar
DecentHeliotrope5034
Understanding Malware and Its Types
10 questions
Use Quizgecko on...
Browser
Browser