Questions and Answers
Computer Security
Ans- concerned w/ risk mgmt, confidentiality, integrity, and availability of
the electronic info that is processed and stored w/in a computing system
Risk Mgmt
Ans- recognition, consequences, and assessment of risk to a comp's assets.
Also developing strategies to manage and protect them
Hacker/Hacktivist
Ans- someone who tries to invade or disable a comp's security measures and
then steals comp resources
,Firewall
Ans- specialized hard and software that ensures only authorized personnel
and employees w/in a business can use intranet
Proxy Server
Ans- special security comp.
-allows communication in or out.
-protects from external threats
Default-deny
Ans- firewall rule that only allows network connections that have been
permitted
Default-allow
Ans- firewall rule that allows all traffic unless it's been blocked
Computer/Metamorphic Virsues
,Ans- files that reproduce by making copies of them w/in a comp's memory,
storage, or on a network
Malware
Ans- programs intended to damage comp system w/out end user knowing
Experimental Hardware
Ans- research project to understand how to combat malware
Worms
Ans- like a virus in a sense that it replicates itself, but can be worse bc
doesn't need to attach itself to an existing program to spread
-travels through network
-can harm by slowing performance, erasing files, damaging physical hardware
Trojan Horse
Ans- seems harmless and even interesting at first until executed
, -can release any sort of malicious programs
-doesn't need user intervention, waits for an action or date
Spyware
Ans- comp program installed to capture or take control of a system w/user
knowledge or consent
-monitors key strokes
-installs new software
Adware
Ans- advertising supported software. Irritating bc not malicious
-from internet w/out user intervention
-adware programmers motivated for economic reasons
Spamming
Ans- abuse of email system to send millions of bulk
-advertising, chain letters, criminal schemes