Exam 9: Privacy, Security, and Ethics
Describe the three most common types of malware, including viruses, worms, and Trojan horses.
Viruses are programs that migrate through networks and operating systems, and most attach themselves to different programs and databases. While some viruses are relatively harmless, many can be quite destructive. Once activated, these destructive viruses can alter and/or delete files. Creating and knowingly spreading a virus is a very serious crime and a federal offense punishable under the Computer Fraud and Abuse Act. Unfortunately, new computer viruses are appearing all the time. The best way to stay current is through services that keep track of viruses on a daily basis. Worms are programs that simply replicate themselves over and over again. Once active in a network, the self-replicating activity clogs computers and networks until their operations are slowed or stopped. Viruses and worms typically find their way into microcomputers through e-mail attachments and programs downloaded from the Internet. Trojan horses are programs that come into a computer system disguised as something else. Trojan horses are not viruses. Like worms, however, they can be carriers of viruses. The most common types of Trojan horses appear as free computer games and free screen saver programs that can be downloaded from the Internet. When a user downloads one of these programs, a virus is deposited on their computer system.
It is highly likely that each one of us has an electronic profile created by information resellers.
True
Which type of program would likely be used by investigators to record a potential suspects' Internet activities?
C
Cutting and pasting material from a website directly into your own report or paper without giving proper credit to the original source is unethical.
A program that replicates itself and clogs computers and networks.
A(n) _______ acts as a security buffer between a corporation's private network and all external networks.
Free computer games and free screen saver programs are typical carriers of _______.
Using publically available databases, information resellers create _______ and sell them to direct marketers, fundraisers, and others.
Computer criminals that create and spread viruses are punished under this law.
A(n) _______ attack attempts to slow down or stop a computer system or network by sending repetitive requests for information.
This type of computer criminal creates and distributes malicious programs.
This type of Wi-Fi hotspot operates close to a legitimate Wi-Fi hotspot and steals information such as usernames and passwords.
The archiving and search features of the web make your online identity available indefinitely.
Programs used to secretly record an individual's activities on the Internet are called _______.
This is a legal concept that gives content creators the right to control use and distribution of their work.
Describe how information about individuals is collected and compiled.
_______ bugs are invisible images or HTML code hidden within a web page or e-mail message and are used to transmit information without your knowledge.
The use of the Internet, cell phones, or other devices to send or post content intended to hurt or embarrass another person.
A(n) _______ Wi-Fi hotspot imitates a legitimate free Wi-Fi hotspot in order to capture personal information.
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)