____ scrambles a message so that it's unreadable to anybody who doesn't have the right key.
Which type of malware is designed to find out the activity of a computer user without his/her knowledge?
What is the problem with preset passwords on the wireless routers used in home networks?
They are simple and predictable
Which type of malware is usually hidden in a document such as a word processing or spreadsheet file?
Biometric authentication identifies individuals by the unique attributes of their
a. retina. b. fingerprints. c. voice.
d. All answers are correct
Cyber attacks are perpetrated by
a. hackers. b. corporate spies. c. organized crime. d. All answers are correct
Sites where you perform financial transactions should always have ____ in place, which protects data as it is being transmitted.
Transport Security Layer (TSL)
____ involves the use of passwords or other identifiers to make sure people accessing information are who they claim to be.
____ is a technique used by malicious hackers to make it appear that they are someone else.
In addition to updating your antivirus software, you should keep your computer secure by regularly updating your
What is a social engineer?
a. a con artist who employs tactics to trick people into giving up valuable information
An Intrusion Prevention System (IPS) is robust form of a(n) ____ program used by network administrators.
A ____ attack attempts to crash a corporate Internet site by bombarding it with continuous service requests.
Of the following types of malware, which could be considered mostly unwelcome and annoying rather than harmful?
Teaching kids not to click on links that might download viruses is a simple example of this kind of computer security.
Which of the following types of malware opens a back door to your computer for malicious hackers?
It has been estimated that ____ percent of all computers connected to the Internet today are zombies.
The two main points raised in Chapter 8 regarding cell phone security are 1) to protect your phone from theft, and 2) to
be cautious with your use of Bluetooth.
In the Chapter 8 podcast, what is Dr. Amin referring to when he says he worries about a "multi-prong" attack?
a cyber attack that is accompanied by chemical, biological, or other threats
Which of the following is not a characteristic of a virus?
It is designed to gain access to the system software.
A study cited in Chapter 8 found that cyber attacks caused intellectual property losses averaging ____ dollars.
FYI p.230 diagram -public key encryption
step 1 you send a public key
step 2 friends computer applies the public key to an email message to encrypt it
step 3 friend sends the encrypted email back
step 4 my computer applies a private key to encrypt the message
TSL (or Transport Layer Security
FYI p 235When buying an item on a site, during the checkout process, the http: in the address line should change to https:. This indicates that the site uses the TSL (or Transport Layer Security) protocol to protect your purchase information.
FYI p. 243 It's wise to use an uninterruptable power supply (abbreviated UPS) for individual computers.
UPS systems provide backup if power goes down. A company can prevent data loss due to a power surge by using surge protectors.