What are the minimum components a system should include for internet security?
What is the primary function of a firewall in internet security?
It serves as a barrier between the internal and external networks and prevents unauthorized access to the internal network.
How does antivirus software protect a computer?
It recognizes and incapacitates viruses before they can do damage.
What is encryption in the context of internet security?
It is the process of converting data into a code, requiring a key to convert the code back to data, and preventing unauthorized reading.
What are the two criteria a program must meet to be considered a virus?
How does a Trojan horse differ from a virus?
A Trojan horse does not replicate itself, whereas a virus does.
What is a worm in the context of computer security?
A program that replicates itself from system to system without the use of any host file.
What is a virus hoax?
It is an email telling the recipient that a file on their computer is a virus when it is actually a file needed by the computer to operate correctly. The email tells them to delete the file, which if done causes the computer to malfunction.
What are some specific computer crimes?
What is the role of the FBI’s Cyber Division?
Responsible for investigating cyberattacks.
What is a port scanner used for?
A software that can probe a server or a computer for open ports. Port scanners have legitimate uses, but they are also used by hackers to locate and exploit vulnerabilities.
What is a sniffer in computer security?
A piece of software that grabs all the traffic flowing into and out of a computer attached to a network.
Sniffers have legitimate uses as well as illegitimate uses.
What is the best defense against phishing?
For recipients to not respond to emails requesting personal or financial information and to not click on links in such emails.
What is a proxy server and its function?
It is a computer and software that creates a gateway to and from the internet, handling web access requests and functioning as a firewall.
What is social engineering in the context of cybercrime?
It involves deceiving company employees into divulging information such as passwords, usually through a fraudulent email but it may be through something as simple as a telephone call.
What is the difference between phishing and social engineering?
What is dumpster diving in the context of cybercrime?
It is sifting through a company’s trash for information that can be used to break into its computers or assist in social engineering.
What is the primary responsibility of recipients in preventing phishing and other scams?
Employee education is a vital part of internet security.
Recipients need to know:
Recipients of popup “notifications” about malware on their computers should know there is no legitimate scenario in which a computer will tell them it is infected and tell them to call a toll-free number.
What is encryption in information systems?
It converts data into a code and then a key is required to convert the code back to data.
What are the two methods of encryption used for internet security?
What is a disadvantage of secret key encryption used for internet security?
Every pair of senders and receivers must have a separate set of keys that match.
How does public key/private key encryption work in internet security?
Each entity publishes a public key for encrypting data while keeping a private key to itself as the only means for decrypting that data.
What is the role of a Certificate Authority in public key/private key encryption used for internet security?
It validates the company’s identity and then issues a certificate and unique public and private keys.
What is business continuity planning?
The process of creating and maintaining a plan for recovery in the event of a natural disaster, a cyberattack, or another risk that could put the company out of business.