10 Questions
What type of malware demands payment in exchange for restoring access to a computer or data?
Ransomware
Which type of malware replicates itself in the active memory of a computer?
Worm
What term is used to describe a program that contains malicious code inside a seemingly harmless program?
Trojan horse
Which type of malware is disguised as something else, causing a computer to behave in an unexpected and usually undesirable manner?
Virus
What type of malware does not replicate itself, but rather causes a computer to behave in an unexpected and usually undesirable manner?
Virus
What does the federal law address related to computers?
Fraud and related activities in association with computers
What is the main focus of the CIA security triad?
Confidentiality, integrity, and availability
What does confidentiality ensure in the CIA security triad?
Only authorized individuals can access sensitive data
What does integrity ensure in the CIA security triad?
Data can only be changed by authorized users
What aspect of the CIA security triad ensures data can be accessed when needed?
Availability
Study Notes
Types of Exploits
- Ransomware: Malware that restricts access to computer or data until demands are met, often involving payment of a ransom
- Virus: A piece of code disguised as a legitimate program, causing a computer to behave unexpectedly and undesirably
- Worm: A harmful program that resides in active memory, duplicating itself to spread harm
- Trojan horse: A program that conceals malicious code within a seemingly harmless program
Federal Laws for Prosecuting Computer Attacks
- Addresses fraud and related activities associated with computers
- Covers false claims regarding unauthorized use of credit cards
- Focuses on unlawful access to stored communications to obtain, alter, or prevent authorized access to a wire or electronic communication while it is in electronic storage
CIA Security Triad
- Refers to the confidentiality, integrity, and availability of systems and data
- Confidentiality: ensures only authorized individuals can access sensitive data
- Integrity: ensures data can only be changed by authorized users
- Availability: ensures data can be accessed when and where needed
Learn about the different types of cyber threats, including ransomware, viruses, worms, and Trojan horses. Understand how they work and how to protect yourself from these malicious programs.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free