Podcast
Questions and Answers
What is the primary function of a key logger?
What is the primary function of a key logger?
What is the primary goal of information security?
What is the primary goal of information security?
What is social engineering?
What is social engineering?
What is war-driving?
What is war-driving?
Signup and view all the answers
What is the term for software that has a malicious purpose?
What is the term for software that has a malicious purpose?
Signup and view all the answers
What is the term for gaining unauthorized access to a system?
What is the term for gaining unauthorized access to a system?
Signup and view all the answers
What is a common method for spreading a virus?
What is a common method for spreading a virus?
Signup and view all the answers
What is a logic bomb?
What is a logic bomb?
Signup and view all the answers
What is the purpose of a Trojan horse?
What is the purpose of a Trojan horse?
Signup and view all the answers
What is the purpose of spyware?
What is the purpose of spyware?
Signup and view all the answers
Study Notes
Cyber Security
- Cyber security refers to the protection of information systems, data, and services from unauthorized access, harm, or misuse.
- Protection includes harm caused intentionally by the system operator or accidentally due to failing to follow security procedures.
Information Security
- Information security is the preservation of confidentiality, integrity, and availability of information.
- Additional properties involved in information security include authenticity, accountability, non-repudiation, and reliability.
Malware
- Malware is a generic term for software with a malicious purpose.
- Types of malware include viruses, worms, adware, Trojan horses, and spyware.
- Viruses are small programs that replicate and hide themselves inside other programs, usually without the user's knowledge.
- Viruses can cause network slowdowns due to heavy network traffic caused by replication.
- Trojan horses are electronic programs that appear to be benign but secretly download malware onto the computer.
- Spyware is software that tracks a user's activities on their computer, including browsing history.
- Logic bombs are software that lay dormant until a specific condition is met, then perform malicious acts.
- Key loggers record all keystrokes and can take periodic screenshots of the computer.
Security Breaches
- Security breaches include any attempt to gain unauthorized access to a system.
- Examples of security breaches include cracking passwords, elevating privileges, and breaking into a server.
- Cracking is the act of intruding into a system without permission, usually with malevolent intent.
- Social engineering is a technique for breaching a system's security by exploiting human nature rather than technology.
- War-dialing and war-driving are techniques used to gain entry to a system by calling phone numbers or locating vulnerable wireless networks.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Learn about the basics of cyber security, including the protection of information systems, data, and services from unauthorized access, harm, or misuse. Understand the importance of confidentiality, integrity, and availability of information.