Ethics In Technology DSST
(Review Test 2023-2024)
Boot Sector Virus - ANS-An infectious program that can replace the boot program with a
modified,
... [Show More] infected version, often causing boot and data retrieval problems.
The boot sector virus is so named because it can overtake your computer when it is
booting up.
Trojan Horse or Program Virus - ANS-a coded program which masks the existence of a
virus or malware by making its appearance look normal while containing malicious
utilities transparent to the user; utilities that execute unnoticed in the background until it
is too late.
Primary intent is to steal personal info
Macro Virus - ANS-a virus that attaches itself to a document that uses macros ie.
Microsoft Word and Excel
Browser Hijacker - ANS-Changes your homepage or settings in your browser window
have been modified without your permission. Come from adware and spyware.
Resident Virus - ANS-Loaded into random access memory (RAM) each time the
computer is turned on and stays there.
Can effect any file in your system if the program is not executed.
Cavity Virus - ANS-Sometimes called a spacefiller virus, is inserted into the empty
spaces that exist in regular computer files.
Undetectable since it does not change the size of the file.
Polymorphic Virus - ANS-A virus that can change its own code or periodically rewrites
itself to avoid detection. Changes its name to avoid detection.
Overwrite Virus - ANS-a virus that can partially or completely delete information
contained in files it infects. Even replacing portions of application code with its own
payload.
Multipartite Virus - ANS-Literally meaning "multipart" virus; spread in numerous ways
and infect your computer based on different variables including the start-up of an
operating system,
Avoiding Virus and Trojans - ANS-Always avoid opening e-mail and attachments from
individuals you do not know.
Install reputable anti-virus software
Never activate questionable hyperlinks.
Add a firewall or router to your network.
Run your anti-virus frequently, especially after each session where you have
downloaded apps or programs.
CIA of Cybersecurity - ANS-Confidentiality, Integrity and Availability
Malware - ANS-software that is intended to damage or disable computers and computer
systems. Non self replicating.
Computer Virus - ANS-a software program capable of reproducing itself and usually
capable of causing great harm to files or other programs on the same computer
Signature Based Virus Detection - ANS-Has its own detection database. Need to stay
up to date on the user side to be effective. attackers continuously change virus to avoid
detection
Confidentiality - ANS-Cybersecurity should ensure that the information to be secured is
only accessible to authorized users and prevents the disclosure of information to
unauthorized parties.
ie to implement confidentiality of company information on a cloud-based Customer
Relationship Management (CRM) system, access can be restricted to users with the
right username-password combination
Integrity - ANS-Cybersecurity efforts should ensure information remains accurate,
consistent and not subject to unauthorized modification.
ie: info not intercepted and modified by an intruder.
Availability - ANS-Efforts to secure information in cyberspace should not hinder its
access by an authorized party. Additionally, cybersecurity implementation has to
provide for redundancy access in case of any outage.
Caesar Cipher - ANS-a technique for encryption that shifts the alphabet by some
number of characters
Enigma Machine - ANS-German secret code machine. The Allies managed to crack the
code and read German messages.
Non-repudiation - ANS-know who accessed this information, when, and how. example: f
someone accesses your bank balance information, the bank will know who did it and
when it was accessed and how they got it.
Continues... [Show Less]