ITS 230 MD 5
F 1. Any illegal act involving the use of a computer or related devices generally is referred to as a crimeware.
F 2. A rootkit displays an online advertisement in a banner or pop-up window on webpages, email, or other Internet services.
T 3. Viruses, worms, and other malware can be hidden in downloaded game files and mobile apps.
T 4. An audit trail records in a file both successful and unsuccessful access attempts.
T 5. It is good practice to change your password frequently.
T 6. Intentionally erasing software would be considered software theft.
F 7. A typical license agreement allows you to rent or lease the software.
F 8. Unencrypted, readable data is called ciphertext.
F 9. Private key encryption also is called asymmetric key encryption.
T 10. VPNs encrypt data to help ensure that the data is safe from being intercepted by unauthorized people.
T 11. When data is traveling to or from a computer to a cloud service, it is subject to interception.
T 12. Full backups are made at regular intervals on removable media in a grandparent-parent-child backup scheme.
1. access control: I 2. Bot: C 3. Cookie: D 4. digital certificate: E 5. disc burning software: F
6. keygen: G 7. Phishing: B 8. script kiddie: H 9. technology ethics: J 10. Zombie: A
//a. compromised computer or device whose owner is unaware the computer or device is being controlled remotely by an outsider
//b. scam in which a perpetrator sends a message in an attempt to obtain personal or financial information
//c. program that performs a repetitive task on a network
//d. small text file that a web server stores on your computer
//e. notice that guarantees a user or website is legitimate
//f. program that writes text, graphics, audio, and video files on a recordable or rewritable disc
//g. program that creates software registration numbers and sometimes activation codes
//h. hacker who does not have the technical skills and knowledge of a cracker
//i. security measure that defines who can access a computer, device, or network; when they can access it; and what actions they can take while accessing it
//j. moral guidelines that govern the use of computers, mobile devices, information systems, and related technologies
2. My next steps would be to call all the appropriate institutions that are in charge of my information. If I had given my bank account number I would call my bank and tell them to freeze my accounts. Also I would probably go down to the bank and have all my cards cancelled and changed. If it was something more serious like social security number I would call who ever is in charge of things like those and explain that you think your number was leaked.
3. The email attachment may have been some type of virus or malware. When you opened it there may have been something that started to run in the background. It could be sending all your activity somewhere else which could cause your computer to slow down.
4. I would make sure to open my antivirus software and make sure that it actually needs to be updated. Then if it did I would follow the instructions to update from the app.
7. My first step would be to check and see if caps lock was on and try again. If that didn’t work I would try refreshing the page because maybe it’s just not displaying the same image that the database thought.
2. Twitter.com. One thing you can do is make sure to change your password semi-frequently. Another thing is to not login to untrusted sites using your credentials. You can change your tweets to allow that only people who you are following can see them. You can set your profile to private just like on Facebook so only people who you are following can look at your tweets. You can report any post you would like to but you have to specify a reason for doing so and then it gets reviewed. If you use the mobile apps and leave your phone for a bit someone could get into your account through your phone. The same goes with laptops as they usually just automatically log into the site.