Technology in Action - Chapter 9
40 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Cybercrime includes any criminal action done primarily through the use of a computer.

True

Identity theft is the least financially damaging cybercrime for individuals.

False

White-hat hackers break into systems for illegal purposes.

False

A packet analyzer is a tool used by hackers to monitor network traffic.

<p>True</p> Signup and view all the answers

A distributed denial-of-service (DDoS) attack launches DoS attacks from more than one device at the same time.

<p>True</p> Signup and view all the answers

A virus is a program that seeks to protect computers from malicious software.

<p>False</p> Signup and view all the answers

A Trojan horse program appears useful but performs malicious actions without the user's knowledge.

<p>True</p> Signup and view all the answers

Logical ports are physical communication paths used for connecting devices.

<p>False</p> Signup and view all the answers

A backdoor program allows hackers to have limited access to a computer.

<p>False</p> Signup and view all the answers

Zombies are computers that hackers control to launch denial-of-service attacks.

<p>True</p> Signup and view all the answers

Boot-sector viruses replicate onto a computer's master boot record.

<p>True</p> Signup and view all the answers

In a denial-of-service attack, users are denied access due to legitimate requests being honored.

<p>False</p> Signup and view all the answers

Worms require a host file to execute and spread.

<p>False</p> Signup and view all the answers

Polymorphic viruses change their code to avoid detection by security software.

<p>True</p> Signup and view all the answers

Grey-hat hackers illegally break into systems but do so to showcase their expertise.

<p>True</p> Signup and view all the answers

The only type of hackers are white-hat and black-hat hackers.

<p>False</p> Signup and view all the answers

Encryption or ransomware viruses typically ask for payment to decrypt files.

<p>True</p> Signup and view all the answers

Adware displays sponsored advertisements on a computer.

<p>False</p> Signup and view all the answers

A time bomb virus is activated based on specific logical conditions.

<p>False</p> Signup and view all the answers

Stealth viruses hide their code in active memory to avoid being detected.

<p>True</p> Signup and view all the answers

Spyware is a desirable program that enhances system performance.

<p>False</p> Signup and view all the answers

Cookies are small text files stored on your hard drive by websites.

<p>True</p> Signup and view all the answers

Phishing is a method used to trick users into revealing personal information.

<p>True</p> Signup and view all the answers

Scareware convinces users their computer is safe while selling legitimate antivirus tools.

<p>False</p> Signup and view all the answers

A firewall can be a software program or hardware device used to protect against hackers.

<p>True</p> Signup and view all the answers

Spam filters can remove known or suspected spam from your inbox.

<p>True</p> Signup and view all the answers

Social engineering involves using technical skills to access personal information.

<p>False</p> Signup and view all the answers

Antivirus protection is typically included in comprehensive Internet security packages.

<p>True</p> Signup and view all the answers

Tracking cookies search your hard drive for personal information.

<p>False</p> Signup and view all the answers

Pretexting involves creating a legitimate sounding scenario to gather information.

<p>True</p> Signup and view all the answers

Firewalls can filter out packets sent to specific logical ports.

<p>True</p> Signup and view all the answers

Antivirus software is designed to enhance internet speed.

<p>False</p> Signup and view all the answers

A virus signature is unique to a specific computer virus.

<p>True</p> Signup and view all the answers

Drive-by downloads affect nearly 1 in 1,000 web pages.

<p>True</p> Signup and view all the answers

Passwords should be easy to remember and consist only of lowercase letters.

<p>False</p> Signup and view all the answers

Biometric authentication devices use unique personal characteristics for validation.

<p>True</p> Signup and view all the answers

Voice authentication is not considered a biometric authentication method.

<p>False</p> Signup and view all the answers

Logical port blocking involves a firewall refusing requests for specific ports.

<p>True</p> Signup and view all the answers

Quarantining allows viruses to spread to other files.

<p>False</p> Signup and view all the answers

Windows Hello is a biometric authentication system that uses facial recognition.

<p>True</p> Signup and view all the answers

Study Notes

Technology in Action - Chapter 9

  • Chapter title: Securing Your System: Protecting Your Digital Data and Devices
  • Cybercrime: Any criminal activity primarily performed using a computer.
  • Cybercriminals: Individuals who use computers, networks, and the internet to commit crimes.
  • Common Cybercrimes: FBI-related scams, identity theft, non-delivery of merchandise, and advance fee fraud. Other serious issues include computer intrusions (hacking), child pornography, and blackmail.
  • Identity Theft: Occurs when a thief steals personal information and poses as the victim. It's the most financially damaging cybercrime for individuals.
  • Types of Identity Theft Scams:
  • Counterfeiting credit and debit cards
  • Requesting changes of address
  • Opening new credit cards
  • Obtaining medical services
  • Buying a house in the victim's name and reselling it

Identity Theft and Hackers

  • Hackers: Individuals who unlawfully access computer systems.
  • Types of Hackers:
  • White-hat hackers: Ethical hackers who test security systems.
  • Black-hat hackers: Break into systems for malicious reasons or illegal gain.
  • Grey-hat hackers: Break into systems to demonstrate expertise or sell repair services.
  • Packet analyzer (sniffer): A program used by hackers to inspect data packets traveling through networks.
  • Keylogger: A program that captures keystrokes made on a computer.

Hacking (Continued)

  • Trojan horses: Programs that appear useful but contain malicious code. They run in the background without the user's knowledge.
  • Backdoor programs and rootkits: Allow hackers to gain access to a computer system without detection.

Hacking (Continued)

  • Zombies: Hacked computers controlled remotely by a hacker.
  • Denial-of-service (DoS) attacks: Hackers try to deny legitimate users access to a computer system by sending excessive requests.
  • Distributed denial-of-service (DDoS) attacks: Hackers use many zombie computers to launch a DoS attack.
  • Botnet: A large group of zombie computers controlled by a hacker.

Exploits and Vulnerabilities

  • Exploit kits: Software programs that look for vulnerabilities in computers and servers to break in.
  • Logical ports: Virtual pathways used for communication between devices on networks.

Computer Viruses

  • Viruses: Programs that attach to other programs to spread to other computers. Their main purpose is to replicate and copy code into as many files as possible. Secondary objectives can be destructive (displaying messages to destroying files).

  • Types of Viruses:

  • Boot-sector viruses: Replicates themselves onto the hard drive's master boot record.

  • Logic bombs and time bombs: Triggered by specific conditions (e.g., dates or number of times a program is used) or specific time.

  • Worms: Work independently of host files, spreading quickly.

  • Script and macro viruses: Series of commands that run without user knowledge.

  • E-mail viruses: Spread by attachments to emails.

  • Encryption viruses: Encrypt files and make them unusable until a ransom is paid.

  • Methods for Avoiding Detection:

  • Polymorphic viruses: Change code to avoid detection.

  • Multi-partite viruses: Designed to infect multiple file types.

  • Stealth viruses: Temporarily erase code from files and hide in active memory to avoid detection.

Online Annoyances

  • Malware: Software with malicious intent.
  • Types of Malware:
  • Adware: Displays sponsored advertisements.
  • Spyware: Unwanted software that transmits information in the background; uses cookies.
  • Keystroke logger: Monitors keystrokes.

Spam

  • Spam: Unwanted or junk email.
  • Spam filters: Tools to sort and isolate spam emails.

Cookies

  • Cookies: Small text files websites automatically store on a computer hard drive when a person visits a website.
  • Use: Help companies track website traffic and effectiveness of marketing strategy.

Online Social Engineering

  • Social engineering: Using social skills to manipulate someone into revealing sensitive information.
  • Pretexting: Creating a scenario that sounds legitimate to trick someone for info.
  • Phishing: Luring someone into revealing info by creating fake websites and emails.
  • Pharming: Malicious code planting on a computer to gather information.
  • Scareware: Attempts to manipulate by claiming the targeted computer is infected.

Firewalls

  • Firewall: Software or hardware to protect computers from hackers.
  • Methods:
  • Packet filtering: Filters out packets sent to specific logical ports.
  • Logical port blocking: Completely refuses requests from the Internet on specific ports.
  • Network address translation (NAT): Assigns internal IP addresses on a network.

Preventing Virus Infections

  • Antivirus software: Detects and protects computers from viruses.
  • Methods:
  • Virus signature: Portion of the virus code unique to a particular virus.
  • Quarantining: Placing a virus in a secure area.
  • Inoculation: Records attributes about files to identify and isolate malware.
  • Drive-by download: Exploiting weaknesses to download viruses; prevents by maintaining up to date operating system software.

Authentication

  • Strong passwords: At least 8 characters; include uppercase, lowercase, numbers, and symbols.
  • Biometric authentication: Using unique physical characteristics for authentication (fingerprint, iris scan, voice scan, face scan).

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Description

Explore the critical concepts of cybersecurity in Chapter 9 of 'Technology in Action.' This chapter covers various types of cybercrime, including identity theft and the role of hackers. Learn how to protect your digital data and devices from potential threats.

More Like This

Cybercrime Overview Quiz
40 questions

Cybercrime Overview Quiz

LovedVirginiaBeach avatar
LovedVirginiaBeach
Technology in Action - Chapter 9
38 questions
Technology in Action, Chapter 9
40 questions
Use Quizgecko on...
Browser
Browser