IT Computer Security JEOPARDY Router Viruses Modes WAN Web WANSecurity Router Router Spyware Prevention Removal Security Threats Basics Encapsulation Services Commands ►►► Final Jeopardy ◄◄◄ 100 100 100 100 100 100 200 200 200 200 200 200 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Viruses 100 A program written with malicious intent. Question A: What is a virus? 100 100 100 100 100 100 200 200 200 200 200 200 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Viruses 200 A self-replicating program that is harmful to networks Question A: What is a worm? 100 100 100 100 100 100 200 200 200 200 200 200 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Viruses 300 This is often disguised as useful software. Question A: What is a Trojan? 100 100 100 100 100 100 200 200 200 200 200 200 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Viruses 400 Worms are harmful in a network because they do this to network bandwidth. Question A: What is Consume the Network Bandwidth? 100 100 100 100 100 100 200 200 200 200 200 200 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Viruses 500 A virus that records anything typed into the computer by the keyboard and sends a log to the virus author. Question A: What is a Keylogger? 100 100 100 100 100 100 200 200 200 200 200 200 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Spyware 100 Displays advertising on the user’s computer. Question A: What is Adware? 100 100 100 100 100 100 200 200 200 200 200 200 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Spyware 200 Monitors activity on the computer. Question A: What is Spyware? 100 100 100 100 100 100 200 200 200 200 200 200 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Spyware 300 A file that may or may not be harmful that tracks user web browsing behaviour Question A: What is a Tracking Cookie? 100 100 100 100 100 100 200 200 200 200 200 200 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Spyware 400 Installing this type of software is usually how adware is installed on a user’s system. Question A: What is a Shareware/Bundled Software? 100 100 100 100 100 100 200 200 200 200 200 200 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Spyware 500 Unwanted software designed to infiltrate a computer system and send out personal information. Question A: What is Grayware or Malware? 100 100 100 100 100 100 200 200 200 200 200 200 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Web Security 100 Two of the three web tools that attackers use to install a program on a computer Question A: What are ActiveX, Java, Javascript? 100 100 100 100 100 100 200 200 200 200 200 200 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Web Security 200 Multiple windows appearing on the screen above your browser window. Question A: What are pop-ups? 100 100 100 100 100 100 200 200 200 200 200 200 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Web Security 300 A form of attack to gain access to resources on devices by pretending to be a trusted computer or website. Question A: What is spoofing? 100 100 100 100 100 100 200 200 200 200 200 200 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Web Security 400 This prompt will appear in IE to prevent unwanted software from being installed by websites. Question A: What is the Internet Security Bar? 100 100 100 100 100 100 200 200 200 200 200 200 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Web Security 500 This tab found in the Internet Options will allow you to customize your ActiveX, Java and Cookie settings. Question A: What is the Security Tab? 100 100 100 100 100 100 200 200 200 200 200 200 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Security Threats 100 An event or attack that results in theft or damage of office hardware such as switches, servers, laptops, etc. Question A: What is a Physical Threat? 100 100 100 100 100 100 200 200 200 200 200 200 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Security Threats 200 An event or attack that results in the removal, corruption, or unauthorized access of confidential information. Question A: What is a Data Threat? 100 100 100 100 100 100 200 200 200 200 200 200 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Security Threats 300 When attackers use available resources such as a passwords or scripts to gain unauthorized access to a network. Question A: What is an Unstructured Attack? 100 100 100 100 100 100 200 200 200 200 200 200 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Security Threats 400 When attackers use code to access operating systems and software. Question A: What is a Structured Attack? 100 100 100 100 100 100 200 200 200 200 200 200 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Security Threats 500 Accidental or intentional attacks from company employees. Question A: What are Internal Threats? 100 100 100 100 100 100 200 200 200 200 200 200 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Prevention 100 Two common indications of SPAM email that anti-spam software will recognize. Question A: What are No Subject Line, Incomplete return address, Computer general e-mail, Return e-mail not sent by user? 100 100 100 100 100 100 200 200 200 200 200 200 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Prevention 200 This can be disabled to prevent reinfection of your system should you ever decide to ‘roll back’ to a previous saved point. Question A: What is System Restore? 100 100 100 100 100 100 200 200 200 200 200 200 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Prevention 300 When installed, it can monitor your computer system and prevent further infection from unauthorized changes by Spyware programs. Question A: What is Spybot’s TeaTimer & SD Helper? 100 100 100 100 100 100 200 200 200 200 200 200 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Prevention 400 Installing these will ensure your system’s security is up to date and any known vulnerabilities are eliminated. Question A: What are Operating System and Software Updates and Patches? 100 100 100 100 100 100 200 200 200 200 200 200 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Prevention 500 This type of software will prevent websites from displaying annoying and unwanted windows. Question A: What is a Pop-up Blocker? 100 100 100 100 100 100 200 200 200 200 200 200 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Removal 100 Pressing F8 at the beginning of the computer’s bootup sequence will allow you access to this Windows feature.. Question A: What is the Advanced Startup Menu & Safe Mode? 100 100 100 100 100 100 200 200 200 200 200 200 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Removal 200 After scanning for a virus in Safe Mode, an additional scan should be run in this mode Question A: What is normal mode? 100 100 100 100 100 100 200 200 200 200 200 200 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Removal 300 The number of different spyware scanners you should utilize when removing spyware. Question A: What is Two? 100 100 100 100 100 100 200 200 200 200 200 200 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Removal 400 This should be done when a virus is detected on your system by your antivirus program. Question A: What is Delete or Move to Vault/Quaruntine? 100 100 100 100 100 100 200 200 200 200 200 200 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Removal 500 This type of virus scan should be done if you suspect your computer has a startup or boot sector virus. Question A: What is a boot-time scan? 100 100 100 100 100 100 200 200 200 200 200 200 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500 Final Jeopardy These are three signs that your computer may be infected. Question A: What are computer starts acting abnormally, program does not respond to mouse and keystrokes, program starting or shutting down on their own, CPU usage is high, unidentifiable or large number of processes running, computer slows down significantly or crashes, e-mail program begins sending out large quantities of e-mail? 100 100 100 100 100 100 200 200 200 200 200 200 300 300 300 300 300 300 400 400 400 400 400 400 500 500 500 500 500 500