100% Verified Graded A+
1. Computer Security
Answer: concerned with risk management, confidentiality, integrity, and the availability of the electronic
information that is processed and stored within a computing system
2. risk management
Answer: includes the recognition, consequences, and assessment of risk to a computer's assets, and
developing strategies to manage and protect them
3. hacker
Answer: also known as hacktivist, is somebody who attempts to invade of disable a computer's security measures
and then to steal the computer resources at their leisure
4. unsecured computer
Answer: computer that is extremely easy to breach, especially by a seasoned hacker
5. the key aspect of an intranet is
Answer: privacy
6. firewall
,Answer: entails specialized hardware and software working together that only authorized personnel and employ-
ees within a business can use its intranet
7. keep unauthorized users out of private intranets
Answer: firewalls
8. any communications in or out of an intranet pass through a special security
computer called a as a precaution to protect from any external
threats
Answer: proxy server
9. port
Answer: used to contain and delay structural fire from spreading to contiguous buildings
10. standard security practices dictate a firewall rule set in that the
only network connections that are permitted are the ones that have been
explicitly allowed
Answer: default-deny
11. default-allow
Answer: rule set in that all traflc is allowed unless it has been specifically blocked
12. computer viruses
Answer: computer files that reproduce by making copies of them within a computer's memory, storage, or on
a network
,13. metamorphic virus
Answer: Are viruses can alter how the appear and known to avoid detection.
14. malware
Answer: programs specifically intended to penetrate or damage a computer system without the end user's
knowledge
15. experimental malware
Answer: written as research project to further understand how to combat them
16. worms
Answer: self-replicating but can be potentially more insidious in that is does not need to attach itself to an
existing program to spread
17. Trojan horses
Answer: program that often seems harmless and interesting at fist until it is executed
18. spyware
Answer: program that is installed covertly on a computer to capture or take control of the system without the user's
knowledge or consent
19. adware
Answer: also called advertising-supported software, programs that automatically display or download adver- tising
to a computer
, 20. spamming
Answer: also called junk email, abuse of an email system to arbitrarily send millions of on solicited bulk
messages
21. denial of service attack
Answer: DoS for short, attempt to make a a computer or any of its resources unavailable to its intended users
22. reverse phishing/keylogging
Answer: when a perpetrator logs onto a computer workstation and installs a program that simply records
every keystroke made at the workstation's keyboard
23. antivirus software
Answer: computer programs that attempt to identify, prevent, and eliminate computer viruses and malware
24. two popular antivirus programs are
Answer: Symantec Corporation's Norton Antivirus and McAfee's VirusScan
25. system patches
Answer: updates sent out to fix security threats in the operating system
26. strong passwords
Answer: longer in length than ordinary passwords, typically 8-12 characters
27. passphrase
Answer: memorable strong password
28. internet fraud