Technology in Action, Chapter 9
40 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary characteristic of cybercrime?

  • Perpetration primarily through the use of a computer (correct)
  • Use of electronic devices
  • Involvement of physical theft
  • Significant legal implications
  • Which of the following is not a common category of complaint related to cybercrime?

  • FBI-related scams
  • Identity theft
  • Data encryption (correct)
  • Advance fee fraud
  • What is the financial impact of identity theft on individuals?

  • Minimal compared to other cybercrimes
  • It is the most financially damaging (correct)
  • Only affects businesses financially
  • Financially damaging only in specific cases
  • What type of hacker is known for breaking into systems for nonmalicious reasons?

    <p>White-hat hacker</p> Signup and view all the answers

    What function does a keylogger serve?

    <p>Captures all keystrokes made on a computer</p> Signup and view all the answers

    What is a Trojan horse in cybersecurity terms?

    <p>A malicious program that appears useful</p> Signup and view all the answers

    What role do 'zombies' play in a denial-of-service attack?

    <p>They launch attacks on other computers</p> Signup and view all the answers

    Which term refers to a program that allows unauthorized access to a system?

    <p>Backdoor</p> Signup and view all the answers

    What is one method commonly used in identity theft?

    <p>Counterfeiting credit cards</p> Signup and view all the answers

    Which type of hacker illegally accesses systems to showcase their skills?

    <p>Grey-hat hacker</p> Signup and view all the answers

    What is the primary purpose of spyware?

    <p>To transmit information about users</p> Signup and view all the answers

    What is the function of a spam filter?

    <p>To categorize emails into folders</p> Signup and view all the answers

    Which statement is true regarding cookies?

    <p>Cookies are stored on your hard drive by websites</p> Signup and view all the answers

    What technique is used in phishing?

    <p>Creating fake scenarios to lure users</p> Signup and view all the answers

    What does scareware attempt to do?

    <p>Convince users their computer is infected</p> Signup and view all the answers

    Which of the following statements accurately describes a firewall?

    <p>It protects computers from unauthorized access</p> Signup and view all the answers

    What does pretexting involve?

    <p>Creating a false scenario to extract information</p> Signup and view all the answers

    What is the main concern regarding the use of cookies by advertisers?

    <p>Cookies invade user privacy indiscriminately</p> Signup and view all the answers

    What is a primary characteristic of pharming?

    <p>It involves planting malicious code on computers</p> Signup and view all the answers

    What security feature do comprehensive Internet security packages typically include?

    <p>Antivirus protection</p> Signup and view all the answers

    What is a distributed denial-of-service (DDoS) attack?

    <p>An attack that uses multiple zombie computers to flood requests.</p> Signup and view all the answers

    What is the primary purpose of a virus?

    <p>To replicate itself and spread to other computers.</p> Signup and view all the answers

    What defines a boot-sector virus?

    <p>A virus that attaches itself to a computer's master boot record.</p> Signup and view all the answers

    How does a logic bomb function?

    <p>By activating under certain logical conditions.</p> Signup and view all the answers

    What characterizes a stealth virus?

    <p>It hides its code temporarily and resides in active memory.</p> Signup and view all the answers

    What happens when a computer is infected with ransomware?

    <p>It compresses data files and demands payment for decryption.</p> Signup and view all the answers

    What is a botnet?

    <p>A network of zombie computers controlled to perform attacks.</p> Signup and view all the answers

    What type of virus can change its code to avoid detection?

    <p>Polymorphic virus</p> Signup and view all the answers

    What is the main goal of adware?

    <p>To display unsponsored advertisements.</p> Signup and view all the answers

    Which type of virus is activated by time or date passage?

    <p>Time bomb</p> Signup and view all the answers

    What is the process called when firewalls filter out packets sent to specific logical ports?

    <p>Packet filtering</p> Signup and view all the answers

    What is the main purpose of antivirus software?

    <p>To detect viruses and protect files</p> Signup and view all the answers

    What does a virus signature refer to?

    <p>The unique code of a specific virus</p> Signup and view all the answers

    What involves placing a virus in a secure area to prevent its spread?

    <p>Quarantining</p> Signup and view all the answers

    Which attack exploits weaknesses in operating systems and can affect web pages?

    <p>Drive-by download</p> Signup and view all the answers

    What is a recommended characteristic of strong passwords?

    <p>At least eight characters with mixed types</p> Signup and view all the answers

    What type of device reads a unique personal characteristic for authentication?

    <p>Biometric authentication device</p> Signup and view all the answers

    What does inoculation entail in the context of computer security?

    <p>Recording key attributes of files</p> Signup and view all the answers

    Which of the following companies offers antivirus software?

    <p>Symantec</p> Signup and view all the answers

    Which biometric feature is commonly used for authentication in modern devices?

    <p>Fingerprint</p> Signup and view all the answers

    Study Notes

    Technology in Action, Chapter 9

    • Chapter 9 is titled "Securing Your System: Protecting Your Digital Data and Devices"
    • Copyright © 2021 Pearson Education Ltd.

    Identity Theft and Hackers

    • Cybercrime is any criminal action primarily using a computer.
    • Cybercriminals use computers, networks, and the internet to commit crimes.
    • Common complaints include FBI-related scams, identity theft, non-delivery of merchandise, and advance fee fraud.
    • Other serious complaints include computer intrusions, hacking, child pornography, and blackmail.

    Identity Theft

    • Identity theft occurs when a thief steals information and poses as you.
    • This type of cybercrime is highly damaging financially.
    • Common scams include counterfeiting credit/debit cards, changing addresses, opening new accounts, obtaining medical services, or buying and reselling houses in your name.

    Hacking (1 of 4)

    • A hacker is someone who unlawfully accesses a computer system.
    • Types of hackers include white-hat (ethical), black-hat, and grey-hat hackers.
    • Packet analyzers (sniffers) capture data packets.
    • Keyloggers record keystrokes.

    Hacking (2 of 4)

    • Trojan horses appear useful but run malicious code.
    • Backdoor programs and rootkits enable hackers to access and control computers.

    Hacking (3 of 4)

    • Zombies are computers controlled by hackers.
    • Denial-of-service (DoS) attacks deny legitimate users access to systems.
    • Distributed denial-of-service (DDoS) attacks are launched from multiple zombies.
    • Botnets are large groups of zombie computers.

    Hacking (4 of 4)

    • Exploit kits are programs that search for vulnerabilities on computer servers.
    • Logical ports are virtual communication pathways, not physical locations.

    Computer Viruses (Basics)

    • Viruses are programs that attach to other programs to spread.
    • Their main purpose is replication.
    • Secondary objectives may include being destructive (e.g., displaying messages, damaging files).
    • Smartphones and tablets can also get infected.

    Types of Viruses (1 of 2)

    • Viruses come in various types: boot-sector viruses, logic bombs/time bombs, worms, script/macro viruses, email viruses, and encryption viruses.
    • Boot-sector viruses affect the master boot record of a hard drive.
    • Logic bombs and time bombs execute based on conditions or time.
    • Worms spread independently.
    • Script/macro viruses are command sequences.
    • Email viruses spread through email attachments.
    • Encryption viruses encrypt files and demand payment for decryption.

    Types of Viruses (2 of 2)

    • Viruses are classified by their methods of avoiding detection.
    • Polymorphic viruses change their code to avoid detection, often targeting specific file types.
    • Multi-partite viruses infect multiple file types.
    • Stealth viruses hide their code and reside in active memory.

    Online Annoyances and Social Engineering (1 of 3)

    • Malware is software with malicious intent.
    • Adware displays sponsored ads.
    • Spyware secretly collects information.
    • Keystroke loggers record keystrokes.

    Online Annoyances (2 of 3)

    • Spam is unwanted email.
    • Tactics include spam filters.

    Online Annoyances (3 of 3)

    • Cookies are small text files saved on a computer when visiting a website.
    • They help companies evaluate advertising effectiveness and may invade privacy but do not directly search for personal information.

    Social Engineering (1 of 3)

    • Social engineering is using human interaction (social skills) to get someone to reveal sensitive information.
    • Pretexting creates a scenario that sounds legitimate to gain trust.

    Social Engineering (2 of 3)

    • Phishing tricks people into revealing information by imitating trustworthy sources.
    • Pharming plants malicious code for data gathering.
    • Avoiding traps is crucial: never respond directly to suspicious emails; don't click on links; verify requests; use secure sites; use phishing filters.

    Social Engineering (3 of 3)

    • Scareware tricks users into believing their computer is infected, then directs them to fake removal tools.

    Restricting Access to Your Digital Assets (Firewalls 1 of 3)

    • Firewalls can be software or hardware that protect computers from hackers.
    • Operating systems often include firewalls.

    Restricting Access to Your Digital Assets (Firewalls 2 of 3)

    • Security suites often include firewall software.

    Restricting Access to Your Digital Assets (Firewalls 3 of 3)

    • Packet filtering blocks packets destined for specific logical ports.
    • Logical port blocking completely rejects requests for access to those ports.
    • Network Address Translation (NAT) assigns internal IP addresses on a network.

    Restricting Access to Your Digital Assets (Preventing Virus Infections 1 of 3)

    • Antivirus software detects and protects computers from viruses.
    • Popular programs include Symantec, Trend Micro, and Avast.

    Restricting Access to Your Digital Assets (Preventing Virus Infections 2 of 3)

    • Virus signatures are unique portions of virus code.
    • Quarantining puts viruses in a secure area.
    • Inoculation records computer file attributes and keeps statistics.

    Restricting Access to Your Digital Assets (Preventing Virus Infections 3 of 3)

    • Drive-by downloads are attacks exploiting system vulnerabilities.
    • Keeping your operating system updated helps avoid these threats.

    Restricting Access to Your Digital Assets (Authentication: Passwords and Biometrics 1 of 2)

    • Strong passwords are crucial.
    • Minimum: eight characters with upper/lowercase, numeric, and symbols.

    Restricting Access to Your Digital Assets (Authentication: Passwords and Biometrics 2 of 2)

    • Biometric authentication devices (fingerprint, iris patterns, voice, face recognition), provide high security, convert unique characteristics to digital codes.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    Explore Chapter 9 of 'Technology in Action', which focuses on securing your system and protecting digital data and devices. Understand the concepts of identity theft and the various forms of cybercrime that threaten our security. Learn about the role of hackers and the impact of cybercrimes on individuals and organizations.

    More Like This

    Cybercrime Overview Quiz
    40 questions

    Cybercrime Overview Quiz

    LovedVirginiaBeach avatar
    LovedVirginiaBeach
    Technology in Action - Chapter 9
    38 questions
    Use Quizgecko on...
    Browser
    Browser