Podcast
Questions and Answers
Cybercrime includes any criminal action done primarily through the use of a computer.
Cybercrime includes any criminal action done primarily through the use of a computer.
True (A)
Identity theft is the least financially damaging cybercrime for individuals.
Identity theft is the least financially damaging cybercrime for individuals.
False (B)
White-hat hackers break into systems for illegal purposes.
White-hat hackers break into systems for illegal purposes.
False (B)
A packet analyzer is a tool used by hackers to monitor network traffic.
A packet analyzer is a tool used by hackers to monitor network traffic.
A distributed denial-of-service (DDoS) attack launches DoS attacks from more than one device at the same time.
A distributed denial-of-service (DDoS) attack launches DoS attacks from more than one device at the same time.
A virus is a program that seeks to protect computers from malicious software.
A virus is a program that seeks to protect computers from malicious software.
A Trojan horse program appears useful but performs malicious actions without the user's knowledge.
A Trojan horse program appears useful but performs malicious actions without the user's knowledge.
Logical ports are physical communication paths used for connecting devices.
Logical ports are physical communication paths used for connecting devices.
A backdoor program allows hackers to have limited access to a computer.
A backdoor program allows hackers to have limited access to a computer.
Zombies are computers that hackers control to launch denial-of-service attacks.
Zombies are computers that hackers control to launch denial-of-service attacks.
Boot-sector viruses replicate onto a computer's master boot record.
Boot-sector viruses replicate onto a computer's master boot record.
In a denial-of-service attack, users are denied access due to legitimate requests being honored.
In a denial-of-service attack, users are denied access due to legitimate requests being honored.
Worms require a host file to execute and spread.
Worms require a host file to execute and spread.
Polymorphic viruses change their code to avoid detection by security software.
Polymorphic viruses change their code to avoid detection by security software.
Grey-hat hackers illegally break into systems but do so to showcase their expertise.
Grey-hat hackers illegally break into systems but do so to showcase their expertise.
The only type of hackers are white-hat and black-hat hackers.
The only type of hackers are white-hat and black-hat hackers.
Encryption or ransomware viruses typically ask for payment to decrypt files.
Encryption or ransomware viruses typically ask for payment to decrypt files.
Adware displays sponsored advertisements on a computer.
Adware displays sponsored advertisements on a computer.
A time bomb virus is activated based on specific logical conditions.
A time bomb virus is activated based on specific logical conditions.
Stealth viruses hide their code in active memory to avoid being detected.
Stealth viruses hide their code in active memory to avoid being detected.
Spyware is a desirable program that enhances system performance.
Spyware is a desirable program that enhances system performance.
Cookies are small text files stored on your hard drive by websites.
Cookies are small text files stored on your hard drive by websites.
Phishing is a method used to trick users into revealing personal information.
Phishing is a method used to trick users into revealing personal information.
Scareware convinces users their computer is safe while selling legitimate antivirus tools.
Scareware convinces users their computer is safe while selling legitimate antivirus tools.
A firewall can be a software program or hardware device used to protect against hackers.
A firewall can be a software program or hardware device used to protect against hackers.
Spam filters can remove known or suspected spam from your inbox.
Spam filters can remove known or suspected spam from your inbox.
Social engineering involves using technical skills to access personal information.
Social engineering involves using technical skills to access personal information.
Antivirus protection is typically included in comprehensive Internet security packages.
Antivirus protection is typically included in comprehensive Internet security packages.
Tracking cookies search your hard drive for personal information.
Tracking cookies search your hard drive for personal information.
Pretexting involves creating a legitimate sounding scenario to gather information.
Pretexting involves creating a legitimate sounding scenario to gather information.
Firewalls can filter out packets sent to specific logical ports.
Firewalls can filter out packets sent to specific logical ports.
Antivirus software is designed to enhance internet speed.
Antivirus software is designed to enhance internet speed.
A virus signature is unique to a specific computer virus.
A virus signature is unique to a specific computer virus.
Drive-by downloads affect nearly 1 in 1,000 web pages.
Drive-by downloads affect nearly 1 in 1,000 web pages.
Passwords should be easy to remember and consist only of lowercase letters.
Passwords should be easy to remember and consist only of lowercase letters.
Biometric authentication devices use unique personal characteristics for validation.
Biometric authentication devices use unique personal characteristics for validation.
Voice authentication is not considered a biometric authentication method.
Voice authentication is not considered a biometric authentication method.
Logical port blocking involves a firewall refusing requests for specific ports.
Logical port blocking involves a firewall refusing requests for specific ports.
Quarantining allows viruses to spread to other files.
Quarantining allows viruses to spread to other files.
Windows Hello is a biometric authentication system that uses facial recognition.
Windows Hello is a biometric authentication system that uses facial recognition.
Flashcards
Cybercrime
Cybercrime
Criminal activity primarily performed through computer use.
Cybercriminal
Cybercriminal
Someone who uses computers to commit crimes.
Identity Theft
Identity Theft
Criminals steal personal info to impersonate you.
Hacker
Hacker
Signup and view all the flashcards
White-hat Hacker
White-hat Hacker
Signup and view all the flashcards
Black-hat Hacker
Black-hat Hacker
Signup and view all the flashcards
Trojan horse
Trojan horse
Signup and view all the flashcards
Denial-of-service attack
Denial-of-service attack
Signup and view all the flashcards
Zombie computer
Zombie computer
Signup and view all the flashcards
Packet analyzer (sniffer)
Packet analyzer (sniffer)
Signup and view all the flashcards
DDoS Attack
DDoS Attack
Signup and view all the flashcards
Botnet
Botnet
Signup and view all the flashcards
Virus
Virus
Signup and view all the flashcards
Logic Bomb
Logic Bomb
Signup and view all the flashcards
Time Bomb
Time Bomb
Signup and view all the flashcards
Worm
Worm
Signup and view all the flashcards
Polymorphic Virus
Polymorphic Virus
Signup and view all the flashcards
Multipartite Virus
Multipartite Virus
Signup and view all the flashcards
Malware
Malware
Signup and view all the flashcards
Ransomware
Ransomware
Signup and view all the flashcards
Cookies
Cookies
Signup and view all the flashcards
Social Engineering
Social Engineering
Signup and view all the flashcards
Pretexting
Pretexting
Signup and view all the flashcards
Phishing
Phishing
Signup and view all the flashcards
Pharming
Pharming
Signup and view all the flashcards
Scareware
Scareware
Signup and view all the flashcards
Firewall
Firewall
Signup and view all the flashcards
Antivirus Protection
Antivirus Protection
Signup and view all the flashcards
Packet Filtering
Packet Filtering
Signup and view all the flashcards
Logical Port Blocking
Logical Port Blocking
Signup and view all the flashcards
Network Address Translation (NAT)
Network Address Translation (NAT)
Signup and view all the flashcards
Antivirus Software
Antivirus Software
Signup and view all the flashcards
Virus Signature
Virus Signature
Signup and view all the flashcards
Quarantine
Quarantine
Signup and view all the flashcards
Drive-by Download
Drive-by Download
Signup and view all the flashcards
Strong Passwords
Strong Passwords
Signup and view all the flashcards
Biometric Authentication
Biometric Authentication
Signup and view all the flashcards
Windows Hello
Windows Hello
Signup and view all the flashcards
Study Notes
Technology in Action - Chapter 9
- Chapter title: Securing Your System: Protecting Your Digital Data and Devices
- Cybercrime: Any criminal activity primarily performed using a computer.
- Cybercriminals: Individuals who use computers, networks, and the internet to commit crimes.
- Common Cybercrimes: FBI-related scams, identity theft, non-delivery of merchandise, and advance fee fraud. Other serious issues include computer intrusions (hacking), child pornography, and blackmail.
- Identity Theft: Occurs when a thief steals personal information and poses as the victim. It's the most financially damaging cybercrime for individuals.
- Types of Identity Theft Scams:
- Counterfeiting credit and debit cards
- Requesting changes of address
- Opening new credit cards
- Obtaining medical services
- Buying a house in the victim's name and reselling it
Identity Theft and Hackers
- Hackers: Individuals who unlawfully access computer systems.
- Types of Hackers:
- White-hat hackers: Ethical hackers who test security systems.
- Black-hat hackers: Break into systems for malicious reasons or illegal gain.
- Grey-hat hackers: Break into systems to demonstrate expertise or sell repair services.
- Packet analyzer (sniffer): A program used by hackers to inspect data packets traveling through networks.
- Keylogger: A program that captures keystrokes made on a computer.
Hacking (Continued)
- Trojan horses: Programs that appear useful but contain malicious code. They run in the background without the user's knowledge.
- Backdoor programs and rootkits: Allow hackers to gain access to a computer system without detection.
Hacking (Continued)
- Zombies: Hacked computers controlled remotely by a hacker.
- Denial-of-service (DoS) attacks: Hackers try to deny legitimate users access to a computer system by sending excessive requests.
- Distributed denial-of-service (DDoS) attacks: Hackers use many zombie computers to launch a DoS attack.
- Botnet: A large group of zombie computers controlled by a hacker.
Exploits and Vulnerabilities
- Exploit kits: Software programs that look for vulnerabilities in computers and servers to break in.
- Logical ports: Virtual pathways used for communication between devices on networks.
Computer Viruses
-
Viruses: Programs that attach to other programs to spread to other computers. Their main purpose is to replicate and copy code into as many files as possible. Secondary objectives can be destructive (displaying messages to destroying files).
-
Types of Viruses:
-
Boot-sector viruses: Replicates themselves onto the hard drive's master boot record.
-
Logic bombs and time bombs: Triggered by specific conditions (e.g., dates or number of times a program is used) or specific time.
-
Worms: Work independently of host files, spreading quickly.
-
Script and macro viruses: Series of commands that run without user knowledge.
-
E-mail viruses: Spread by attachments to emails.
-
Encryption viruses: Encrypt files and make them unusable until a ransom is paid.
-
Methods for Avoiding Detection:
-
Polymorphic viruses: Change code to avoid detection.
-
Multi-partite viruses: Designed to infect multiple file types.
-
Stealth viruses: Temporarily erase code from files and hide in active memory to avoid detection.
Online Annoyances
- Malware: Software with malicious intent.
- Types of Malware:
- Adware: Displays sponsored advertisements.
- Spyware: Unwanted software that transmits information in the background; uses cookies.
- Keystroke logger: Monitors keystrokes.
Spam
- Spam: Unwanted or junk email.
- Spam filters: Tools to sort and isolate spam emails.
Cookies
- Cookies: Small text files websites automatically store on a computer hard drive when a person visits a website.
- Use: Help companies track website traffic and effectiveness of marketing strategy.
Online Social Engineering
- Social engineering: Using social skills to manipulate someone into revealing sensitive information.
- Pretexting: Creating a scenario that sounds legitimate to trick someone for info.
- Phishing: Luring someone into revealing info by creating fake websites and emails.
- Pharming: Malicious code planting on a computer to gather information.
- Scareware: Attempts to manipulate by claiming the targeted computer is infected.
Firewalls
- Firewall: Software or hardware to protect computers from hackers.
- Methods:
- Packet filtering: Filters out packets sent to specific logical ports.
- Logical port blocking: Completely refuses requests from the Internet on specific ports.
- Network address translation (NAT): Assigns internal IP addresses on a network.
Preventing Virus Infections
- Antivirus software: Detects and protects computers from viruses.
- Methods:
- Virus signature: Portion of the virus code unique to a particular virus.
- Quarantining: Placing a virus in a secure area.
- Inoculation: Records attributes about files to identify and isolate malware.
- Drive-by download: Exploiting weaknesses to download viruses; prevents by maintaining up to date operating system software.
Authentication
- Strong passwords: At least 8 characters; include uppercase, lowercase, numbers, and symbols.
- Biometric authentication: Using unique physical characteristics for authentication (fingerprint, iris scan, voice scan, face scan).
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Explore the critical concepts of cybersecurity in Chapter 9 of 'Technology in Action.' This chapter covers various types of cybercrime, including identity theft and the role of hackers. Learn how to protect your digital data and devices from potential threats.