Boot Sector Virus - ANSAn infectious application that can replace the boot application with a
modified, inflamed model, frequently inflicting boot and data retrieval issues.
The boot area virus is so named because it can overtake your computer while it's miles
booting up.
Trojan Horse or Program Virus - ANSa coded application which masks the existence of an
endemic or malware with the aid of making its look look normal while containing malicious
utilities transparent to the person; utilities that execute disregarded within the history till it's
miles too late.
Primary intent is to scouse borrow personal info
Macro Virus - ANSa virus that attaches itself to a report that makes use of macros ie.
Microsoft Word and Excel
Browser Hijacker - ANSChanges your homepage or settings in your browser window have
been changed with out your permission. Come from adware and adware.
Resident Virus - ANSLoaded into random access reminiscence (RAM) each time the laptop
is turned on and stays there.
Can impact any record on your system if the program isn't always accomplished.
Cavity Virus - ANSSometimes known as a spacefiller virus, is inserted into the empty areas
that exist in normal computer documents.
Undetectable because it does no longer change the dimensions of the report.
Polymorphic Virus - ANSA virus that may trade its very own code or periodically rewrites
itself to avoid detection. Changes its call to avoid detection.
Overwrite Virus - ANSa virus which could in part or absolutely delete information contained
in documents it infects. Even changing quantities of software code with its own payload.
Multipartite Virus - ANSLiterally which means "multipart" virus; spread in numerous methods
and infect your computer based totally on extraordinary variables which include the start-up
of an working system,
Avoiding Virus and Trojans - ANSAlways avoid opening e-mail and attachments from people
you do no longer recognise.
Install reputable anti-virus software program
,Never set off questionable hyperlinks.
Add a firewall or router for your community.
Run your anti-virus frequently, in particular after each session where you've got downloaded
apps or applications.
CIA of Cybersecurity - ANSConfidentiality, Integrity and Availability
Malware - ANSsoftware that is intended to harm or disable computers and laptop systems.
Non self replicating.
Computer Virus - ANSa software program software capable of reproducing itself and usually
able to causing extremely good harm to files or different programs on the equal computer
Signature Based Virus Detection - ANSHas its own detection database. Need to live up to
date on the person facet to be effective. Attackers constantly exchange virus to avoid
detection
Confidentiality - ANSCybersecurity must make sure that the facts to be secured is simplest
handy to legal customers and forestalls the disclosure of statistics to unauthorized events.
Ie to enforce confidentiality of corporation records on a cloud-based totally Customer
Relationship Management (CRM) gadget, get right of entry to may be confined to users with
the proper username-password mixture
Integrity - ANSCybersecurity efforts ought to make sure records remains accurate, constant
and no longer subject to unauthorized amendment.
Ie: info not intercepted and changed by an intruder.
Availability - ANSEfforts to comfy records in cyberspace need to not avoid its get admission
to by a certified birthday celebration. Additionally, cybersecurity implementation has to
provide for redundancy access in case of any outage.
Caesar Cipher - ANSa technique for encryption that shifts the alphabet by way of some
quantity of characters
Enigma Machine - ANSGerman mystery code device. The Allies managed to crack the code
and study German messages.
Non-repudiation - ANSknow who accessed this statistics, whilst, and the way. Instance: f
someone accesses your financial institution stability facts, the financial institution will
recognize who did it and when it was accessed and the way they were given it.
Info Security or Info Sec - ANScollection of regulations used to shield data no matter how
and where it is used.
Information Privacy - ANSthe proper to decide when and to what quantity statistics about
oneself may be communicated to others.
, Information Privacy Act - ANSprotect people' non-public records from unlawful disclosures
The Children's Online Privacy Protection Act - ANSOrganizations whose audiences are
below the age of 13 and knowingly accumulate their personal information are required to get
parental consent and display their privacy coverage
Gramm-Leach-Bliley Act (GLBA) 1999 - ANSRequires banks and financial institutions to
alert clients in their rules and practices in disclosing client statistics. Must keep information
comfy
Red Flag Rule - ANS-created through the Federal Trade Commission (FTC) to help save
you identity robbery from patient billing bills maintained by way of medical and financial
institutions.
-put in force an identification robbery application that stops and detects caution signs and
symptoms of suspicious interest.
Electronic Surveillance - ANSmonitoring people with era, frequently without their knowledge.
Video recordings, photography, and audio recordings are common electronic surveillance
techniques.
Employee Internet Management (EIM) software program - ANSthat filters and video display
units personnel' Internet usage.
Cracker - ANSsomeone who intentionally breaches safety to break into a person else's
computer or network for a malicious motive.
Identity Theft - ANSThe stealing of another man or woman's social protection range, credit
score card quantity or other private records for the cause of borrowing cash, making
purchases and strolling up debts.
Pre-Constructive Surveillance - ANSis used to watch certain areas using closed circuit
television (CCTV) cameras that file and transmit to neighborhood police agencies.
Re-Constructive Surveillance - ANSuses proof left in the back of at against the law scene to
reconstruct activities which have taken place.
Surveillance Systems - ANScan be used to screen the sports of suspects. Video cameras,
long variety listening devices and flying drone.
FAA Regulations of drones - ANSdrone have to continue to be inside eyesight of the
operator, and the drone need to continue to be under 400 ft. Drones can't be flown above
humans are crowds
Locator beacon - ANSplaced on a suspect's car that sends a sign that tells law enforcement
where a suspect is located.
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Tutor96. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $12.99. You're not tied to anything after your purchase.