CISCO ITE1: PC Hardware & Software Study Guide Module 9 – Security Viruses Mix’n’Match – Write the letter by the appropriate description for the following terms a) Virus ______ Often disguised as useful Software b) Worm ______ A Program Written With Malicious Intent c) Trojan ______ Lays dormant until summoned by the attacker d) Stealth Virus ______ Self-replicating program that is harmful to networks Worms are harmful in a network because they…. Security Threats When this type of software gets installed on your computer, it normally displays advertisements (usually in the form of popups). This type of software monitors activities on your computer. When an attacker pretends to represent a legitimate outside organization to gain information from you is a form of this attack. When someone uses tricks to fool someone into giving access to them unknowingly is this type of attack. ITE1 – Mod9 – Study Guide Three web tools that attackers can exploit vulnerabilities on to install malicious software on your computer. 1. 2. 3. TCP/IP Attacks When an attacker uses vulnerabilities in another system to install software on the computer to initiate attacks on other computer systems (such as DoS) makes the exploited computer this. What type of information is extracted from a replay attack? This type of attack is use to gain access to resources or devices by pretending to be a trusted computer within the network. This is a specific type of DoS attack via random TCP/IP ports. This attack technique is used to redirect a computer to false servers containing malicious content. Security Procedures What file system has increased security and compatibility? A company should create one of these to describe how they will address security issues. What are two levels of password protection? 1. 2. ITE1 – Mod9 – Study Guide List four methods of physical security. 1. 2. 3. 4. What type of encryption can be found cover the entire 802.11i standard? Preventative Maintenance These are patterns in the programming code of the software in a computer – used by antivirus programs to identify threats. This is a code update provided by manufacturers of operating systems and software applications. Used mainly in the Windows-family of Operating Systems, this is a comprehensive update which combines patches and upgrades. This is the default time for Windows Update to install updates and patches. Before you install a service pack or security patch, what is the first step that should be done? Troubleshooting What are two signs that a computer may be infected by a virus? 1. 2. In closing with a customer, you should have them verify this. ITE1 – Mod9 – Study Guide Two resources that could be used to “Evaluate the Problem.” 1. 2. Another type of security that is better than 64-bit WEP is? What are two quick solutions for virus problems? (Hint: A Complete Reformat is not one of them. 1. 2. Bonus Question What type of technology identifies a user through physical characteristics such as fingerprints or retinas? ITE1 – Mod9 – Study Guide