________ can be defined as the reproduction, distribution, and use of software without the permission or authorization of the owner of copyright.
Data Piracy
Random seemingly unrelated facts, numbers, words or statistics.
Data
Is it a good idea to "unsubscribe" or "reply to remove" my address from spam email? Why?
NO, Spammers validate email addresses and will send you more spam.
All of the information that someone can find out about you by searching the web is called your _____.
Digital footprint
Why is a router a form of security?
It acts like a firewall.
3 categories into which computer crimes are traditionally divided
1) computer as an instrument
2) computer as a target
3) computer as an incidental
William Gibson coined this portmanteau (blend of words) that refers to the Internet as a whole
Cyberspace
You receive an email from your bank telling you there is a problem with your account. The email provides instructions and a link so you can log in to your account and fix the problem. What should you do?
Delete the email. Better yet, use the web client (e.g. gmail, yahoo mail, etc.) and report it as spam or phishing, then delete it.
Someone used their yahoo account at a computer lab on campus. She made sure her yahoo account was no longer open in the browser window before leaving the lab. Someone came in behind her and used the same browser to re-access her account. They started sending emails from it and caused all sorts of mayhem. How?
Cookies made sure she was still logged in.
What is a network of infected computers?
Botnet
30-50% of all data loss due to the people already within the organization. Who are these people?
Insiders. Insider Threat.
What is a denial of service attack meant to do?
Make service inoperable.
What type of attack attempts to get a user to click on a malicious link or file by impersonating a trusted source the user is familiar with?
Phishing Attack
Two different offices on campus are working to straighten out an error in an employee's bank account due to a direct deposit mistake. Office #1 emails the correct account and deposit information to office #2, which promptly fixes the problem. The employee confirms with the bank that everything has, indeed, been straightened out. What's wrong here?
Account and deposit information is sensitive data that could be used for identity theft. Sending this or any kind of sensitive information by email is very risky because email is typically not private or secure. Anyone who knows how can access it anywhere along its route.
What type of malware functions by spying on user activity without their knowledge?
Spyware
A deliberate, politically or religiously motivated attack against data compilations, computer programs, and/or information systems that is intended to disrupt and/or deny service or acquire information that disrupts the social, physical, or political infrastructure of a target
Cyberterrorism
What is a DDoS?
Distributed Denial of Service attack.
How did ChronoPay stay with MC & Visa for so long, when they processed transactions for many bad businesses?
They had a large customer-base of good businesses which "hid" the bad transactions.
What category of hackers use tools without the understanding of hacking.
Script kiddies
What is a self-contained program that may spread functional copies of itself to other computer systems
Worm
Disrupting, damaging, or destroying a Web site or computer network
Cyber vandalism
What is DNS?
Domain Name Server
What are "antis"?
Anti-spam companies.
The weakest link in every computer system. The one person who can through thoughtlessness, unawareness or accident, cause loss of work products through deletion, corruption or improperly safeguarding data.
Claims that a virus is spreading and offer to provide software to stop the virus.
Virus Hoax