Name two types of a security breach
How to monitor security procedures
Name a method of providing physical security
What is a dictionary attack
using key words about the individual to crack passwords
what is social engineering?
Social engineering, in the context of security, is understood to mean the art of manipulating people into performing actions or divulging confidential information
Basic user security when using various logins
never use the same password twice and change passwords on a regular basis and use upper and lower case
Name three Biometric devices
Eye Retiner detection
Finger Print Reader
What is spyware?
software that is designed to steal your data and forward it to a third party without your consent or knowledge.
What is a Keylogger?
These are programs which record key presses (i.e. what a user types on the keyboard) and can be used by a hacker to obtain confidential data (login details, passwords, credit card numbers, PINs, etc.).
What is PHISHING?
Phishing is a very specific type of cybercrime designed to trick you into disclosing personal financial details. Cybercriminals create a fake website that looks just like a bank's website (or any other web site where online financial transactions are conducted e.g. eBay).
What is Adware?
Adware is the general term applied to programs that either launch advertisements (often pop-up banners) or re-direct search results to promotional web sites. Adware is often built into freeware or shareware programs: if you download a freeware program, the adware is installed on your system without your knowledge or consent.
What is a ROOT KIT
This term describes a collection of programs used by a hacker to evade detection while trying to gain unauthorized access to a computer.
What is a Virus
A virus is a program that replicates, i.e. it spreads from file to file on your system and from PC to PC.
What is a Worm
Worms are generally considered to be a subset of viruses, but with certain key differences. A worm is a computer program that replicates, but does not infect other files. Instead, it installs itself once on a computer and then looks for a way to spread to other computers.
What to do once security has been compromised
turn off , disconnect ethernet lead and turn off wifi
change passwords , run anti-virus.