Digital Security Risks and Malware
40 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is a digital security risk?

  • A legal action involving computers
  • Any event causing a loss or damage to digital devices (correct)
  • A virus that infects software
  • A network connection failure
  • All digital security risks are considered computer crimes.

    False

    What is malware?

    Malicious software that acts without a user's knowledge to alter computer operations.

    A program that blocks access to files until a payment is made is known as __________.

    <p>ransomware</p> Signup and view all the answers

    Which of the following types of malware collects user information without their knowledge?

    <p>Spyware</p> Signup and view all the answers

    Match the malware types with their descriptions:

    <p>Adware = Displays online advertisements Trojan horse = Hides within a legitimate program Worm = Copies itself repeatedly Rootkit = Allows remote control of a device</p> Signup and view all the answers

    A Trojan horse replicates itself to spread to other computers.

    <p>False</p> Signup and view all the answers

    Name one major difference between a virus and a worm.

    <p>A virus requires a host program to spread, while a worm copies itself to spread independently.</p> Signup and view all the answers

    Information transmitted over networks is at a higher security risk than information kept on __________.

    <p>premises</p> Signup and view all the answers

    Which type of malware is specifically designed to disrupt the functioning of system resources?

    <p>Virus</p> Signup and view all the answers

    What is a botnet?

    <p>A group of compromised computers or mobile devices</p> Signup and view all the answers

    A passphrase is a numeric password assigned by a company.

    <p>False</p> Signup and view all the answers

    What is the purpose of a firewall?

    <p>To protect a network's resources from intrusion.</p> Signup and view all the answers

    A compromised computer or device is known as a ______.

    <p>zombie</p> Signup and view all the answers

    Match the following authentication methods to their descriptions:

    <p>PIN = Numeric password for access Biometric device = Identification through personal characteristics Passphrase = Combination of words for access Possessed object = Item required for access</p> Signup and view all the answers

    What does a denial of service attack (DoS) do?

    <p>Disrupts computer access to an Internet service</p> Signup and view all the answers

    Spoofing makes a network transmission appear illegitimate.

    <p>False</p> Signup and view all the answers

    What is the function of access controls?

    <p>To define who can access a computer, device, or network.</p> Signup and view all the answers

    An example of a biometric device is a ______.

    <p>fingerprint reader</p> Signup and view all the answers

    What is the primary role of an audit trail?

    <p>To record access attempts</p> Signup and view all the answers

    What can cookies be used for on websites?

    <p>Track user visits and target advertisements</p> Signup and view all the answers

    Adware is a type of program that secretly collects user information and sends it to an external source.

    <p>False</p> Signup and view all the answers

    What is phishing?

    <p>A scam to obtain personal and financial information through deceptive messages.</p> Signup and view all the answers

    _________ is a program that collects information about users without their knowledge.

    <p>Spyware</p> Signup and view all the answers

    Match the following terms with their definitions:

    <p>Phishing = Deceptive attempts to obtain sensitive information Spyware = Program that collects user data without consent Content Filtering = Restricting access to certain online material Cookies = Text files stored on computers by websites</p> Signup and view all the answers

    What is the main purpose of social engineering?

    <p>To gain unauthorized access to confidential information</p> Signup and view all the answers

    Clickjacking involves legitimate interfaces without any malicious intentions.

    <p>False</p> Signup and view all the answers

    What does web filtering software do?

    <p>It restricts access to specified websites.</p> Signup and view all the answers

    Employees might have their computer usage __________ by some employers.

    <p>monitored</p> Signup and view all the answers

    Which of these is NOT a purpose of cookies?

    <p>Hacking into user's accounts</p> Signup and view all the answers

    What does a hand geometry system verify?

    <p>The shape and size of a person's hand</p> Signup and view all the answers

    Iris recognition is a method used in digital forensics.

    <p>False</p> Signup and view all the answers

    What is two-step verification?

    <p>A security process that uses two separate methods to verify a user's identity.</p> Signup and view all the answers

    The process of converting data into encoded characters to prevent unauthorized access is called ______.

    <p>encryption</p> Signup and view all the answers

    Match the following areas that use digital forensics with their primary focus:

    <p>Law enforcement = Investigation of crimes Military intelligence = National security Insurance agencies = Fraud detection Information security departments = Protecting network security</p> Signup and view all the answers

    Which of the following best defines information privacy?

    <p>The right to deny or restrict the collection, use, and dissemination of personal data</p> Signup and view all the answers

    Not all information found on the web is accurate.

    <p>True</p> Signup and view all the answers

    What is the main purpose of digital forensics?

    <p>To discover, collect, and analyze evidence found on computers and networks.</p> Signup and view all the answers

    Information theft involves stealing ______ or confidential information.

    <p>personal</p> Signup and view all the answers

    Which of the following methods is NOT a type of biometric verification?

    <p>Keypad entry</p> Signup and view all the answers

    Study Notes

    Digital Security Risks

    • A digital security risk is any event or action that could cause loss or damage to a computer or mobile device's hardware, software, data, information, or processing capabilities.
    • Computer crime is any illegal act involving computers or related devices.
    • Cybercrime is an online or Internet-based illegal act.

    Internet and Network Attacks

    • Information transmitted over networks has a higher security risk than information kept on organizational premises.
    • Malware is malicious software that acts without user knowledge, altering computer and mobile device operations.

    Common Types of Malware

    • Adware: Displays online advertisements on webpages, emails, or Internet services.
    • Ransomware: Blocks or limits access to a computer, phone, or file until a payment is made.
    • Rootkit: Hides within a computer or device, allowing remote control.
    • Spyware: Secretly collects user information and sends it to an outside source.
    • Trojan horse: Appears legitimate but contains malicious code. Doesn't replicate itself.
    • Virus: A potentially damaging program that negatively affects a computer or device by altering its operations without permission.
    • Worm: Copies itself repeatedly, using resources and potentially shutting down systems.

    Internet and Network Attacks (continued)

    • A botnet is a group of compromised computers or devices connected to a network. A compromised computer is known as a "zombie."
    • A denial of service (DoS) attack disrupts computer access to an Internet service, a Distributed DoS attack (DDoS) is specifically more widespread
    • A backdoor is a program that bypasses security controls.
    • Spoofing is a technique that makes network or Internet transmissions appear legitimate.

    Internet and Network Attacks (continued)

    • A firewall is hardware and/or software that protects a network's resources from intrusion.

    Unauthorized Access and Use

    • Access controls define who can access a computer, device, or network, when they can access it, and the actions they can take.
    • Computers, devices, or networks should maintain an audit trail of access attempts (both successful and unsuccessful).
    • Examples of access controls include user names, passwords, passphrases, and PINs.

    Unauthorized Access and Use (continued)

    • Passphrases are private combinations of words, often containing mixed capitalization and punctuation, associated with a user name, allowing access to computer resources.
    • PINs (Personal Identification Numbers) are numeric passwords, either assigned by a company or selected by a user.

    Unauthorized Access and Use (continued)

    • A possessed object is an item required to gain access to a computer or facility.
    • Biometric devices authenticate a person's identity by translating a personal characteristic (e.g., fingerprint, face, iris, signature, voice) into a digital code.

    Unauthorized Access and Use (continued)

    • Examples of biometric devices include fingerprint readers, face recognition systems, hand geometry systems, iris recognition systems, and signature/voice verification systems.

    Unauthorized Access and Use (continued)

    • Two-step verification uses two separate methods to verify a user's identity.

    Unauthorized Access and Use (continued)

    • Digital forensics involves discovering, collecting, and analyzing evidence found on computers and networks.
    • Many areas use digital forensics including law enforcement, criminal prosecutors, military intelligence, insurance agencies, and information security departments.

    Information Theft

    • Information theft occurs when someone steals personal or confidential information.
    • Encryption is a process to convert readable data into encoded characters to prevent unauthorized access.

    Ethics and Society

    • Technology ethics are moral guidelines for the use of computers, mobile devices, information systems, and related technologies.
    • Information accuracy is a concern since not all information on the web is correct.

    Information Privacy

    • Information privacy is the right of individuals and companies to control the collection, use, and dissemination of information about them.
    • Huge online databases store information.
    • Websites often collect data to personalize advertisements and email messages.
    • Some employers monitor computer usage and email messages.

    Information Privacy (continued)

    • Cookies are small text files stored on a computer by web servers.
    • Websites use cookies for personalization, storing user names/passwords, online shopping assistance, tracking visits, and targeted advertisements.

    Information Privacy (continued)

    • Phishing is a scam that sends official-looking messages to obtain personal and financial information.
    • Clickjacking is when an object on a website contains a malicious program.
    • Spyware is a program secretly collecting user information and communicating it to an outside source.
    • Adware is a program that displays advertisements on webpages, emails, or Internet services.

    Information Privacy (continued)

    • Social engineering is gaining unauthorized access by taking advantage of human nature.
    • Federal and state laws address privacy regarding personal data storage and disclosure.
    • Content filtering restricts access to specific material.
    • Web filtering software restricts access to particular websites.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Digital Security PDF

    Description

    This quiz covers essential concepts related to digital security risks, including types of malware and cybercrime. Explore how these threats can impact devices, data, and online safety. Test your knowledge on protecting against these security challenges.

    More Like This

    Use Quizgecko on...
    Browser
    Browser