CIS 105 Chapt. 11 Notes
CIS 105 Chapt. 11 Notes CIS 105
Popular in Computer Appls&Info Technology
Popular in Computer Information Systems
This 3 page Class Notes was uploaded by Brigette Maggio on Monday January 4, 2016. The Class Notes belongs to CIS 105 at Arizona State University taught by Wood, McCarthy in Fall 2015. Since its upload, it has received 109 views. For similar materials see Computer Appls&Info Technology in Computer Information Systems at Arizona State University.
Reviews for CIS 105 Chapt. 11 Notes
Report this Material
What is Karma?
Karma is the currency of StudySoup.
You can buy or earn more Karma at anytime and redeem it for class notes, study guides, flashcards, and more!
Date Created: 01/04/16
CIS 105 9/24/15 McCarthy Chapters 2, 4, and 11 Exam #2 next Tuesday Sunday Chapter 11 Security *Computer SecurityConcerned with Risk Management, Confidentiality, Integrity, and the availability of electronic information that is processed and stored in a computing system. *Risk Management is the recognition, consequences, and assessment of risk to a computer system. (disaster recovery plan) Hackers= criminals Hackers are people who attempt to invade or disable a computer's security measures and steal their resources. Hackers also try to hijack computer processing cycles, speed, and storage space. Unsecured computers are extremely easy to breach, especially by a seasoned hacker. Some techniques include: *(Exe)= on an email is an “executable file” if you click on it, you want to run that file, but it’s most likely a virus *•(Mal)= Malicious attachments to emails can change the name and it can still be bad •Viruses •Worms •Malware = mal (malicious) *can break into even the most protected, sophisticated, and secure computers *Daren broke into McCarthy’s exwife’s computer in 45 seconds found info. to get into it by google *Businesses commonly take advantage of the Internet (Distribution and free browsers) by setting up Intranets (ex.: myasu) *The key aspect of an Intranet is privacy *Intranets are guarded by Firewalls: hardware (Proxy Server) and software that keep unauthorized users out myasu is an intranet *security companies benefit from a virus Malware Threats (Malicious Threats) •Computer Viruses are files that reproduce by making copies of themselves within a computer’s memory, storage, or network. •Experimental Malware written to combat malware. •Worms are like viruses but do not need to attach itself to an existing files to spread. *•Trojan Horses seem harmless and wait for a computer event to spread and unleash other malware. beaming one app to another with palm pilots *viruses run on events and protect content (Ex.: a keystroke, beaming on a certain date) if beam his app, delete his app, delete every app every bought, and delete operating system, and freeze screen, and wait a month to delete everything so they can pass on his app and his virus *•Spyware is a computer program installed covertly and secretly monitors a user’s keystrokes and behavior. •Adware is typically more irritating then malicious and usually installed covertly and automatically display or download advertising to a computer. *adware is malware •Spamming or junk mail is the abuse of an email system to arbitrarily send typically millions of unsolicited bulk messages. *•Denialofservice attack (DOS) attempts to make a computer or any of its resources unavailable to its users. *most dangerous* *•Reverse Phishing / Keylogging is when a user signs into a computer work station where a malicious software covertly records keystrokes *Which of the following is malware? adware *How often does spam have to work in order to be successful? just once startup check what you’ve opened *Does the Cloud eliminate the need to back up a file? yes *•Antivirus software attempts to identify, prevent, and eliminate computer viruses and malware. Examines computer files and matches them to known viruses stored in a database. Two of the more popular antivirus softwares: are Symantics Corporation’s Norton AntiVirus and McAfee’s VirusScan. All computer files should be backed up, but realistically, it’s important to back up files with high priority. Does the Cloud eliminate the need to back up files? yes *•Strong Passwords = take too long to make it worth trying to crack, 50% of the time passwords will be found out, and a passphrase is a memorable, strong password Internet Fraud A broad term that refers to any fraudulent activity that occurs in an online setting. *•Identity Theft is the crime of assuming another’s identity for economic gain (crime) •Click Fraud is a program that automatically clicks advertising networks ads, typically randomly, for pro fit. •Purchase Scams are simply when a unscrupulous merchant does not deliver goods or services already paid for online. •Phishing is a legitimate looking, socially engineered email attempting to deceptively gain private information. Privacy can be defined as the ability of an individual to keep their personal information out of public view Computer privacy is an expectation of remaining anonymous while using a computer system or network. Tracking Cookies are typically text files on a client computer that users are typically unaware of that keeps track of that user’s information. Data Mining is when experts extract useful information from recorded data, like a cookie. Identity theft is a crime concerning the unlawful practice of assuming another individual’s identity. Identity Theft and Identity Fraud are terms used to refer to all types of crimes in which someone wrongfully obtains and uses another person’s personal data for fraud and deception. Shoulder Surfing is when a criminal in a public place glances over their victim’s should to gain information like PIN numbers or passwords. Dumpster Diving is sorting through refuse to gain information that most likely should have been shredded. SCAM Acronym created by the United States Department of Justice in an attempt to guard personal information. Be Stingy about giving out personal information Check your financial information on a regular basis. Ask periodically for your credit report. Maintain careful records. *NEVER give out social security number *Primary where we work/ volatile *Secondary doesn’t need electricity to work (Cloud is secondary) *SOPA stands for Stop Online Piracy Act *type of storage media that is sequential magnetic tape
Are you sure you want to buy this material for
You're already Subscribed!
Looks like you've already subscribed to StudySoup, you won't need to purchase another subscription to get this material. To access this material simply click 'View Full Document'