• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/15

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

15 Cards in this Set

  • Front
  • Back
Spam
unsolicited mass mailings
CAN-SPAM act made it illegal to send uncolicite email without offering way to opt out
Rootkits
softwards that hides presence of intruders
used in combo with trojan software, hackers can change systems setterins and use the computer without user or software detecting it
Computer Viruses
executes unwanted action on victim's computer and has mechanism for replicating itself inside other computer that come in contact
worms
more dangerous evolution of viruses
self propogating - do not need any intervention from the victim - such as clickin on an attachment - to transfer to other pcs
trojan horse
claimes to do one thing but does damage when you run in
installs itself when click on link or disguised pc file
software can be controlled remotely by hackers to extract passwords and other sensitive info
can create ZOMBIE for forwarding spam, phishin emails, and trojan software to millions of other pcs on the interwebzz
man in the middle attack
bogus sites that communicate with legit sites in real time
victims access accounts, but do it the MITM servers that capture all thier info. these servers froce legit site to remain open after victim has logged off, allwing criminals to access acct themselves and w/draw moneyz
computer intrusions or hacking
unauthorized access to pc system; manual or automatic
Denial of Service attack
inundating a pc, router, or other networked device with more packets of data than it can process; blocking any legit requests to access the system
botnets
network of compromised pcs or ZOMBIES that controlled by hackesr, usually through trojans to deliver spam, phishing, and DoS attacks (1 million out there)
phishing
tricks users into giving personal info to use or resale; fake emails and websites; ebay and paypal accts
what are three examples of security actions what malicious sofware threats do they prevent?
INTRUSION DETECTION SYSTEMS: real time, placed at ponts of corporate netwroks to detect intruders; looks for bad passwords and removal of improtant info
---Prevents: computer intrusions, man in the middle attacks, worms, trojans

ANTI VIRUS SOFTWARE: checks for viruses
---prevents: viruses, worms, trojans, phishing, man in the middle, crimeware

SECURITY TRAINING: teaching users to not be stoopid
---prevents: viruses. phishing, rootkits, man in the middle, crimeware
whate are a few security actions a company can take to prevent malicious software attacks?
indtrusion detection software
network monitoring
anti-virus software
security training
null routing
firewalls
data encryption
multi-factor authentification
IP address blacklist
risk assesment
risks are IDd, assessed for their impact and likelihood, then reduced to acceptable level
waht are the thee steps you should take to conduct a risk assessment?
ID potential hazards
ID vulnerable areas
create a business coninutiy plan (data backups and disaster recovery)
whate are 3 things to do/consider when putting togheter a data back up routine?
give one person responsibility for backing up; designate an alternative

use diff tape or disk to back up each day; keep scheduyle

keep backup secure and offsite if possible