CH 8 – Review - WordPress.com

advertisement
Chapter 8



























Botnet is short for robot network – True
A person who runs a botnet is called a – botmaster
Botnets are created using self-propagating software, which means that the software can –
reproduce itself
A good defense to prevent your computer from becoming a zombie is to – install and run
antivirus software
Bluetooth is an – electronics standard
The typical range for consumer Bluetooth devices is 600 feet - False
One way to protect yourself from risks of Bluetooth devices is to – disable Bluetooth when not
in use
One form of authentication used by some Bluetooth device manufacturers is – a PIN number
With symmetric encryption a cipher is known to – both sender and recipient
Encoded and unreadable plaintext is called – ciphertext
Public and private key are created using – very large prime numbers
Asymmetric encryption uses – both a public key and a private key
The author of the file creates a digital signature by running a program known as a – hashtag
function
veriSign is an example of a – certification authority
who or what identifies a secure certificate when you go to a website – your browser
a digital certificate contains a company’s private key – False
what technique has been used by most high profile cyber attacks – spearfishing
what does silverman consider to be the weak link in the computer security chain – people
allowing hackers to access their machines
what does silverman think could be the solution for computer security problems – people
getting better educated about computer security
according to silverman, why is Macintosh now being targeted by malware – more mac users
now make it financially worthwhile
this term describes the use of technology to keep your data and hardware safe – computer
security
which of the following would NOT generally be considered malware – patch
malware that masquerades as a useful program to gain access to your system is called a – Trojan
horse
attempting to gain valuable information by misleading a user as to your identity is called –
spoofing
a software program that records the keys the user types, usually without the iser’s knowledge is
referred to as – keystroke logger
this term generally refers to the practice of pretending to be someone else in order to steal
money or receive some other benefit from the other person’s personal information – identity
theft
this is the practice of transforming data into something unreadable to everyone except those
that have a special key – encryption




a computer that is being used by a hacker to perform a malicious task on the internet without
the owner’s consent is called a – zombie
this is a type of attack that is designed to make a server unavailable to0 its intended users –
denial of service
this term refers to the practice of manipulating people into divulging confidential information –
social engineering
this is a file on a user’s computer that is read by the browser when the user navigates to a
particular website – cookie
Definitions
Biometrics – devices that scan human features such as the retina to identify an individual
Rootkit – a set of programs or utilities designed to allow a hacker to control a victim computer’s
hardware and software and permit a hacker to monitor the user’s actions
WPA – encryption standard used to protect data sent across a wireless network. Designed by the wi-fi
alliance to overcome the security limitations of wired equivalent privacy (WEP)
Worm – self replication computer program with the ability to use and send out copies of itself to every
computer on the network
Private key – a code key used in encryption that is used to decrypt data that has been encrypted by a
public key
Honeypot – as part of a corporate security strategy, a computer set aside to be easily hacked into to
help identify weaknesses in the system and lure away potential hackers from the main system
Logic bomb – piece of code that is placed in a software system to set off a series of damaging events if
certain conditions are met
Adware – software that is supported by advertising and is capable of downloading and installing
spyware
Download