Update
Hackers - ANSWER People who attempt to invade or disable a
computer's security measures and steal their resources
Computer Security - ANSWER Concerned with risk management,
confidentiality, integrity, and the availability of electronic information
that is processed and stored in a computing system. Risk
Management, is the recognition, consequences, and assessment of
risk to a computer system
Risk management - ANSWER includes the recognition,
consequences, and assessment of risk to a computer's assets, and
developing strategies to manage and protect them
At risk - ANSWER All computers are what?
Penalties - ANSWER There are what for ignoring the risk of
computers?
Unsecured computer - ANSWER An _______ is extremely easy to
breach, especially by a seasoned hacker
By sending them emails with malicious attachments like viruses,
worms, and malware - ANSWER What is an easy way to breach
unsecured computers through the internet?
to assume that a computer will be attacked regardless of security
measures and to take preemptive measures to prevent them -
ANSWER What is better than to naively ignore computer security
altogether?
Intranet - ANSWER A businesses' private version of the Internet
that works the same way as the Internet, though it is confined within
the business
,The same concepts and technologies of the Internet such as servers
running with Internet protocols - ANSWER What applies the same
way to an intranet as it does to the internet?
privacy - ANSWER The key aspect of an Intranet is what?
Firewall - ANSWER Specialized hardware and software working
together that ensures that only authorized personnel and employees
within a business can use its intranet
keep unauthorized Internet users our of private intranets -
ANSWER What do firewalls do?
Just another part of the internet? - ANSWER Without a firewall,
an Intranet is what?
A combination of hardware devices and software devices -
ANSWER To protect any network, including a business intranet,
what is employed to create a firewall?
a proxy server - ANSWER Any communications in or out of an
intranet pass through a special security computer called what as a
precaution to protect from any external threats?
The job of firewall - ANSWER It is the job of a what to control the
flow of data and information between computer networks by opening
or closing ports for the various transmission protocols like http,
email, ftp, etc.
Internet is a zone with no trust while an intranet is a zone of very high
trust - ANSWER A common business example of the relationship
between internet and intranet is what?
It can be likened to a fire door in a building that is used to keep the
threat of a fire out, or at least from spreading - ANSWER A
firewalls function within a network can be likened to a what?
Worthless - ANSWER Without proper configuration, a firewall can
often become what?
,"default-deny" - ANSWER Standard security practices dictate a
_____ firewall rule set in that the only network connections that are
permitted are the ones that have been explicitly allowed
a detailed understanding of the network application and endpoints
required for the organization's day-to-day operation - ANSWER A
"default-deny" configuration requires what?
All traffic is allowed unless it has been specifically blocked -
ANSWER "default-allow" rule
"default-allow" rule - ANSWER Many businesses lack
understanding, and therefore implement what?
inadvertent network connections and system compromise -
ANSWER "Default-allow" configuration makes what much more
likely?
biology - ANSWER The term "virus" comes from where?
Metamorphic viruses - ANSWER Computer files that reproduce
by making copies of them within a computer's memory, storage, or
on a network
Malware - ANSWER Computer viruses are a type of what?
Malware includes - ANSWER This includes programs specifically
intended to penetrate or damage a computer system without the end
user's knowledge
Experimental malware - ANSWER have been written as a
research project to further understand how to combat them, while
others are pranks or vandalism
Uses of malware - ANSWER Often used for financial gain whether
its for the purpose of identity theft or to plant spyware that can
monitor another computer's actions. It can even be used for extortion
A computer worm - ANSWER _____ is like a virus in that it is
self-replicating but can be potentially more insidious in that it does
, not need to attach itself to an existing program to spread
copies of themselves - ANSWER Worms use networks to travel by
sending what to other parts of the network without a user's
knowledge or intervention
slowing a system's performance, erasing files, and damaging
physical hardware - ANSWER A worm can harm a computing
system in a variety of ways including what
from the myth of the Trojan War and the enormous wooden horse
used by the Greeks to sneak hundreds of warriors into the city of
Troy - ANSWER Where does the term Trojan Horse originate
from?
Trojan horse - ANSWER a program that often seems harmless
and possibly interesting at first until it is executed. When the program
is executed, it may release one or many harmful viruses, worms, or
any other sort of malicious programs into a computer or networked
system.
user intervention, but instead wait for a particular computer action or
even a particular date - ANSWER Often, Trojan Horses need no
what, but wait for what
Spyware - ANSWER A computer program that is installed
covertly on a computer to capture or take control of the system
without the user's knowledge or consent
Functions of spyware - ANSWER This secretly monitors a user's
keystrokes and behavior, but can also install new software that can
often include more of this or programming to divert a computer to
third party advertising websites
Sometimes the user is actually enabling a third party to install their
own version of spyware, and unwittingly think the computer problem
is solved - ANSWER Problem with buying"spyware cleaning
software"?