Professional Documents
Culture Documents
Kami Export - Digital Secuirty Risk 3
Kami Export - Digital Secuirty Risk 3
**this is expected to be on your desk at all times! Answers are in slideshows on Canvas.
WHAT’S THE RISK OF USING THE INTERNET?
● Think about how much we rely on the internet to perform our daily activities
● Our digital footprints leave traces of our activities everywhere
● Crucial that users take measures to protect or safeguard their computers, mobile devices, data, and programs from loss,
damage, and misuse
● Some intruders may leave evidence of their presence by leaving a message or deliberately alter data
Cybercrimes
● Crimeware: software
__________________________________used by cybercriminals
Worm: program that replicates itself and infects the entire network
_________________________________________________________________________
● Uses up resources and shuts down a device or network
● does not have to be attached through a file
● Bot: a program that performs a ● Attacks have been able to stop operations temporarily at
repetitive task on a network numerous websites, including powerhouses such as Yahoo!,
eBay, Amazon.com, and CNN. com
allows user to bypass security controls
Back Doors: A program or set of instructions in a program that ____________________________________
_______________________________________________ when accessing a program, computer, or network
● Allows them to continue to ___________________________________________________________
access the computer remotely without the user's knowledge
● A rootkit can be a back door
● IP spoofing occurs when an intruder computer fools a network into believing its IP address is associated with a
trusted source
● Email spoofing occurs when the sender’s address or other components of an email header are altered so that it
appears that the email message originated from a different sender
combinations of words
● Passphrase: a private ______________________________, often
containing mixed capitalization and punctuation, associated with a user
Information Security name that allows access to certain computer resources
● Digital signature an encrypted code that ○ More secure than passwords because they are longer
a person, website,or organization
attaches to an electronic message to verify
________________________________ a numeric password
● PIN (Personal Identification Number): _________________________,
________________________________
the identity of the message sender ________________either assigned by a company or selected by a user
● Used to ensure that an impostor is not
participating in an Internet transaction ● Possessed Objects: any item that you must possess
_____________________________________, or
carry with you, in order to gain access to a computer or computer facility
● Digital Certificate: a notice that ○ EX: Smart cards, badges
guarantees a user or a website is legitimate
_________________________________
_________________________________ translating a
● Biometric Scanners: authenticates a person’s identity by ___________
______________________________________
personal characteristic such as a fingerprint,
● Secure Site: A website that uses into a digital code that is compared with a digital code stored in
___________________________
uses encryption techniques to secure its
_________________________________ a computer
_____________________________________ or mobile device verifying
data
_________________________________ a physical or behavioral characteristic
● Uses HTTPS in the URL and may ○ Fingerprint reader, facial recognition, voice verification
display a closed lock