Chapter 8 Botnet is short for robot network – True A person who runs a botnet is called a – botmaster Botnets are created using self-propagating software, which means that the software can – reproduce itself A good defense to prevent your computer from becoming a zombie is to – install and run antivirus software Bluetooth is an – electronics standard The typical range for consumer Bluetooth devices is 600 feet - False One way to protect yourself from risks of Bluetooth devices is to – disable Bluetooth when not in use One form of authentication used by some Bluetooth device manufacturers is – a PIN number With symmetric encryption a cipher is known to – both sender and recipient Encoded and unreadable plaintext is called – ciphertext Public and private key are created using – very large prime numbers Asymmetric encryption uses – both a public key and a private key The author of the file creates a digital signature by running a program known as a – hashtag function veriSign is an example of a – certification authority who or what identifies a secure certificate when you go to a website – your browser a digital certificate contains a company’s private key – False what technique has been used by most high profile cyber attacks – spearfishing what does silverman consider to be the weak link in the computer security chain – people allowing hackers to access their machines what does silverman think could be the solution for computer security problems – people getting better educated about computer security according to silverman, why is Macintosh now being targeted by malware – more mac users now make it financially worthwhile this term describes the use of technology to keep your data and hardware safe – computer security which of the following would NOT generally be considered malware – patch malware that masquerades as a useful program to gain access to your system is called a – Trojan horse attempting to gain valuable information by misleading a user as to your identity is called – spoofing a software program that records the keys the user types, usually without the iser’s knowledge is referred to as – keystroke logger this term generally refers to the practice of pretending to be someone else in order to steal money or receive some other benefit from the other person’s personal information – identity theft this is the practice of transforming data into something unreadable to everyone except those that have a special key – encryption a computer that is being used by a hacker to perform a malicious task on the internet without the owner’s consent is called a – zombie this is a type of attack that is designed to make a server unavailable to0 its intended users – denial of service this term refers to the practice of manipulating people into divulging confidential information – social engineering this is a file on a user’s computer that is read by the browser when the user navigates to a particular website – cookie Definitions Biometrics – devices that scan human features such as the retina to identify an individual Rootkit – a set of programs or utilities designed to allow a hacker to control a victim computer’s hardware and software and permit a hacker to monitor the user’s actions WPA – encryption standard used to protect data sent across a wireless network. Designed by the wi-fi alliance to overcome the security limitations of wired equivalent privacy (WEP) Worm – self replication computer program with the ability to use and send out copies of itself to every computer on the network Private key – a code key used in encryption that is used to decrypt data that has been encrypted by a public key Honeypot – as part of a corporate security strategy, a computer set aside to be easily hacked into to help identify weaknesses in the system and lure away potential hackers from the main system Logic bomb – piece of code that is placed in a software system to set off a series of damaging events if certain conditions are met Adware – software that is supported by advertising and is capable of downloading and installing spyware