Chapter 19: Computer Security

-Describe key security concepts-Define and describe various forms of malicious software-Explain how to protect computers from malicious software and how to recover affected computers

41 cards   |   Total Attempts: 188
  

Cards In This Set

Front Back
Data calssification systems vary by the organization, but a common scheme classifies documents as ______, ______, ______ and ______.
1) public 2) internal use only 3) highly confidential 4) top secret
What is the purpose of a data classification system for an organization?
Using a classification scheme enables employees such as techs to know very quickly what to do with documents, drives containing documents, and more.
What does "compliance" mean in terms of an organization's data security?
It means that members of an organization or company must abide by or comply with all of the rules that apply to the organization or company.
From a technician's point of view, the most common compliance issues revolves around ______, such as what sort of __________.
1) software 2) software users can be allowed to install on their computers.
______ keeps technical support calls down and enables techs to focus on more serious problems.
Compliance
Controlling access to programs, data, and other computing resources is the key to securing your system. Access control includes four interlinked areas requiring your attention: _____; ____; ____; ______
1) physical security 2) authenticiation 3) users and groups 4) secuirty policies
List three preventative methods by which every user can prevent their data from being compromised.
1) store computers with sensitive data in locked rooms 2) never walk away from a computer while logged in 3) log out or lock the computer by pressing WINDOWS LOGO KEY-L
Types of malware include ____, ____, ____, ____, ____ - all of which can wreak havoc on your system.
1) grayware 2) spam 3) virsuses 4) Trojan horses 5) worms
Irritating Web browser probelms include _____; _____ and _____.
1) pop-ups 2) spyware 3) adware
Many ____ remove the navigation aids from the browser window or mimic Windows dialog boxes.
Pop-ups
List two methods to safely close a pop-up.
1) right-click the pop-up's taskbar icon and choose Close 2) press ALT-TAB until the pop-up window is active and then press ALT-F4 to close it
______ can use your computer's resources to run distributed computer applications, capture keystrokes to steal passwords, or worse. It typically disguises itself as a useful utility, so be vigilant about what you install.
Spyware
Some spyware can be removed via ___1___, but for subborn spyware, use a ___2___ such as ___3___ or ____4____.
1) Add or Remove Programs 2) third-party tool 3) Lavasoft's Ad-Aware 4) Pepi MK's Spybot Search & Destroy
What is spam and what is the first step to preventing your email address from receiving it?
Spam is unsolicited email. The best way to prevent spam in your email acccount is to never post your email address on the Internet; over 97 percent of spam comes from email addresses posted online.
What are spam filters?
Spam filters can block spam at the mail server or at your computer.