Final Review

advertisement
When an individual gains access to a
computer or computer resource
without permission.
Unauthorized Access
ISDS 1100 Final Exam Review
Using a computer resource for
unapproved activities.
Unauthorized use
ISDS 1100 Final Exam Review
Organizations typically use this to
explain acceptable computer use to
their authorized users.
Code of Conduct
ISDS 1100 Final Exam Review
The act of breaking into a remote
computer system, often via the
Internet or a wireless network.
Hacking
ISDS 1100 Final Exam Review
The person doing the hacking.
Hacker
ISDS 1100 Final Exam Review
These networks are inherently less
secure than wired networks, so
interception is easier.
Wireless (such as Wi-Fi)
ISDS 1100 Final Exam Review
An act of malicious destruction to
a computer or computer resource.
Computer sabotage
ISDS 1100 Final Exam Review
Common types of computer
sabotage?
1.
2.
3.
Viruses
Denial of Service attacks
Data or program alteration
ISDS 1100 Final Exam Review
A small software program installed
without the permission or knowledge
of the user that is designed to alter
the way a computer operates.
Computer Virus
ISDS 1100 Final Exam Review
Two ways a virus can be sent:
1.
2.
Downloaded from
internet
Sent via email
ISDS 1100 Final Exam Review
These systems verify the person
requesting access is listed as an
authorized user, but can’t tell if the
person is really the individual he or
she claims to be.
Identification Systems
ISDS 1100 Final Exam Review
These systems verify the person
requesting access is who she or he
claim to be.
Authentication Systems
ISDS 1100 Final Exam Review
Three types of access systems?
1.
2.
3.
Possessed Knowledge
Possessed Objects
Biometrics
ISDS 1100 Final Exam Review
This system requires the individual
requesting access to provide
information that only the authorized
user is supposed to know.
Possessed Knowledge
Access system
ISDS 1100 Final Exam Review
Examples of Possessed
Knowledge Access systems:
Passwords, Usernames,
& PINs
ISDS 1100 Final Exam Review
This system uses physical objects
for identification purposes.
Possessed Object
Identification system
ISDS 1100 Final Exam Review
Examples of Possessed Object
Identification systems:
1.
2.
3.
Smart cards
Encoded badges
Magnetic cards
ISDS 1100 Final Exam Review
This system uses biometric readers
to identify users by a particular
unique biological characteristic.
Biometric Access
systems
ISDS 1100 Final Exam Review
Examples of Biometric Access
systems
1.
2.
3.
4.
Fingerprint scanners
Face Readers
Hand Geometry Readers
Iris Scanners
ISDS 1100 Final Exam Review
A security system that acts as a
protective boundary between a
computer network and the outside
world.
Firewall
ISDS 1100 Final Exam Review
Software that should be installed to
protect a computer against becoming
infected with a virus or another type
of malware.
Antivirus Software
ISDS 1100 Final Exam Review
A technique used to secure e-mail
messages or other documents sent
over the Internet.
Encryption
ISDS 1100 Final Exam Review
Two most common types of
encryption:
1.
2.
Private key encryption
Public key encryption
ISDS 1100 Final Exam Review
Protects against unauthorized access
and encrypts data going to and
coming from a server.
Secure web server
ISDS 1100 Final Exam Review
Provides a continuous secure private
tunnel from the user’s computer
through the Internet to the business’s
network.
Virtual Private Network
(VPN)
ISDS 1100 Final Exam Review
A booming area of computer crime
that involves online theft, fraud,
scams, and related activities.
Dot cons
ISDS 1100 Final Exam Review
When someone obtains enough
personal information about a person
to be able to masquerade as the
person.
Identity theft
ISDS 1100 Final Exam Review
Occurs when a buyer pays for
merchandise that is never delivered,
or is delivered but is not as
represented.
Online auction fraud
ISDS 1100 Final Exam Review
A wide range of scams offered
through Web sites or unsolicited emails, such as loan scams, pyramid
schemes, work-at-home cons, &
bogus credit card offers
Internet offer scams
ISDS 1100 Final Exam Review
Making it appear that an e-mail
or a Web site originates from
somewhere other than its actual
source.
Spoofing or phishing
ISDS 1100 Final Exam Review
Occurs when hardware is stolen.
Hardware theft
ISDS 1100 Final Exam Review
Can occur accidentally when hardware is
dropped, gets wet, or is exposed to static or a
power surge. Also can occur intentionally, such
as by a burglar, vandal, or disgruntled employee.
Hardware damage
ISDS 1100 Final Exam Review
The complete malfunction of a
computer system.
System failure
ISDS 1100 Final Exam Review
Protects against damage due to
power fluctuations.
Surge suppressors
ISDS 1100 Final Exam Review
Provides continuous power to a PC
so it doesn’t shut off when the power
goes off.
Uninterruptible Power
Supplies (UPSs)
ISDS 1100 Final Exam Review
It is important to do this with files so
that when a problem occurs, those
files can be restored.
Create Backups (duplicate
copies) of files
ISDS 1100 Final Exam Review
Spells out what an organization will
do to prepare for and recover from a
disruptive event.
Disaster Recovery Plan
ISDS 1100 Final Exam Review
The unauthorized copying of a
computer program.
Software Piracy
ISDS 1100 Final Exam Review
The process of creating copies of
currency and other printed resources
using computers and other types of
digital equipment.
Digital Counterfeiting
ISDS 1100 Final Exam Review
Repeated threats or harassing
behavior via e-mail or another
Internet communications method.
Cyberstalking
ISDS 1100 Final Exam Review
The state of being concealed or
free from unauthorized intrusion.
Privacy
ISDS 1100 Final Exam Review
The rights of individuals and
companies to control how
information about them is
collected and used.
Information Privacy
ISDS 1100 Final Exam Review
Small text files that are stored on
your hard drive by the Web server.
Cookies
ISDS 1100 Final Exam Review
Usually very small (1 pixel by 1 pixel)
image on a Web page that transmits data
about a Web page visitor back to the Web
page’s server.
Web Bugs
ISDS 1100 Final Exam Review
Any software installed without the
user’s knowledge that secretly
gathers information about the user
and transmits it to advertisers.
Spyware
ISDS 1100 Final Exam Review
Unsolicited e-mail sent to a large
group of individuals at one time
and is the electronic equivalent of
junk mail.
Spam
ISDS 1100 Final Exam Review
Other marketing activities used
by companies:
1.
2.
Pop-up and pop-under ads
Telemarketing
ISDS 1100 Final Exam Review
Sorts your incoming e-mail
messages.
E-mail filter
ISDS 1100 Final Exam Review
Blocking access to Web sites
containing objectionable material.
Internet filtering
ISDS 1100 Final Exam Review
Software that records keystrokes,
programs used, or otherwise
monitors the activity a computer is
used for.
Computer monitoring
software
ISDS 1100 Final Exam Review
Monitoring system used by the FBI
to retrieve Internet traffic from a
suspect’s PC.
Carnivore
ISDS 1100 Final Exam Review
The legal rights to which the creators
of intellectual property–original
creative works–are entitled.
Intellectual property
rights
ISDS 1100 Final Exam Review
Main types of intellectual
property rights are:
1.
2.
3.
Copyrights
Trademarks
Patents
ISDS 1100 Final Exam Review
This is a form of protection available to
the creator of an original artistic or literary
work, such as a book, movie, software
program, musical composition, or
painting.
Copyright
ISDS 1100 Final Exam Review
A word, phrase, symbol, or design
that identifies and distinguishes one
good or service from another.
Trademark
ISDS 1100 Final Exam Review
Registering a domain name
confusingly similar to a trademark or
for the purpose of selling the domain
name at an inflated price.
Cybersquatting
ISDS 1100 Final Exam Review
Standards of moral conduct.
Ethics
ISDS 1100 Final Exam Review
This is acquired when software is
purchased. This permits the buyer to
use the program.
Software License
ISDS 1100 Final Exam Review
Four main types of software:
1.
2.
3.
4.
Commercial software
Shareware
Freeware
Public Domain software
ISDS 1100 Final Exam Review
Software that is given away by the
author, but still are copyright
protected.
Freeware
ISDS 1100 Final Exam Review
Software that is distributed on the
honor system; can be shared with
others.
Shareware
ISDS 1100 Final Exam Review
Software that is not copyrighted.
Public Domain software
ISDS 1100 Final Exam Review
Software developed and sold for a
profit; typically can’t be shared with
others.
Commercial software
ISDS 1100 Final Exam Review
Presenting someone else’s work as
your own, which is both a violation
of copyright law and unethical.
Plagiarism
ISDS 1100 Final Exam Review
States what is considered proper and
ethical use of school or company
resources.
Code of conduct
ISDS 1100 Final Exam Review
Summarizes the moral guidelines adopted by a
particular organization and typically address such
issues as honesty, integrity, fairness,
responsibility to others, proper use of intellectual
property, confidentiality, and accountability.
Codes of ethics
ISDS 1100 Final Exam Review
An inaccurate statement or story
spread through the use of computers.
Computer hoax
ISDS 1100 Final Exam Review
The use of computers to modify text,
images, photographs, music, and
other digital content.
Digital manipulation
ISDS 1100 Final Exam Review
Software and hardware products that
have been announced and advertised,
but are not yet–and may never be–
available.
Vaporware
ISDS 1100 Final Exam Review
Two new trends in storage
devices today:
1.
2.
Making portable personal storage more
secure and convenient.
Packing an increasing amount of data onto
optical discs.
ISDS 1100 Final Exam Review
Involves creating computer
components, machines, and other
structures that are less than 100
nanometers (nm) in size.
Nanotechnology
ISDS 1100 Final Exam Review
These computers utilize atoms or
nuclei working together as quantum
bits or qubits.
Quantum computers
ISDS 1100 Final Exam Review
Uses light, such as from laser beams
or infrared beams, to perform
computations.
Optical computers
ISDS 1100 Final Exam Review
For short-range connections, this
is an emerging option.
UltraWideband (UWB)
ISDS 1100 Final Exam Review
The science and engineering of
making intelligent machines.
Artificial Intelligence
(AI)
ISDS 1100 Final Exam Review
Programs that perform specific tasks
to help make a user’s work
environment more efficient or
entertaining.
Intelligent Agents
ISDS 1100 Final Exam Review
Types of intelligent agents
include:
1.
2.
3.
4.
5.
Application assistants
Search agents
Shopping bots
Entertainment bots
Chatterbots
ISDS 1100 Final Exam Review
Software programs that perform
tasks that would otherwise be
performed by a human expert.
Expert Systems
ISDS 1100 Final Exam Review
Expert systems usually consist of
two main components:
1.
2.
Knowledge Base
Inference Engine
ISDS 1100 Final Exam Review
This component of the expert system
applies the rules to the data stored in
the knowledge base to reach
decisions.
Inference engine
ISDS 1100 Final Exam Review
This component of the expert system
contains facts and rules provided by
a human expert.
Knowledge base
ISDS 1100 Final Exam Review
Artificial Intelligence (AI) systems
that attempt to imitate the way a
human brain works.
Neural networks
ISDS 1100 Final Exam Review
The field devoted to the study of
robots.
Robotics
ISDS 1100 Final Exam Review
Devices, controlled by a human
operator or a computer, that can
move and react to sensory input.
Robots
ISDS 1100 Final Exam Review
The use of a computer to create
environments that look the way they
do in the real world.
Virtual Reality (VR)
ISDS 1100 Final Exam Review
This refers to the replacement or
enhancement of body parts by
mechanical versions.
Bionics
ISDS 1100 Final Exam Review
These devices can transfer vital
signs, blood-sugar readings, or other
medical data directly to your
attending physician.
Electronic monitoring
devices
ISDS 1100 Final Exam Review
A chip that is implanted under a person’s
skin to be used for identification purposes;
an ID number can be used to retrieve data
about the individual, such as at a hospital.
VeriChip
ISDS 1100 Final Exam Review
When a robot controlled by a
physician operates on a patient.
Robot-assisted surgery
ISDS 1100 Final Exam Review
When not all surgeons are in the
operating room.
Telesurgery
ISDS 1100 Final Exam Review
The use of communications
technology to provide medical
information and services.
Telemedicine
ISDS 1100 Final Exam Review
A wearable robotic system designed
to give soldiers additional physical
capabilities and protection.
Exoskeleton suit
ISDS 1100 Final Exam Review
Robots used to assess the safety of
trails, buildings, caves, and other
structures before soldiers enter them.
Battlefield robots
ISDS 1100 Final Exam Review
Download