User Tools

Site Tools


ci2011:security_attacks

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
ci2011:security_attacks [2011/03/04 13:41]
Jackie Sebrey
ci2011:security_attacks [2011/03/04 14:15] (current)
Jackie Sebrey
Line 34: Line 34:
  
 __Crapware__:​ __Crapware__:​
 +Crapware is an application that is installed on a computer either when it was built or by the user that uses up hard drive space and RAM. An example of crapware is AOL.
  
 __DoS (Denial of Service)__: __DoS (Denial of Service)__:
 +DoS or Denial of Service is when a website or computer is attacked leaving users unable to connect to the website or computer. A Denial of Service message is displayed.
  
 __Hacker Attacks__: __Hacker Attacks__:
 +Hacker Attacks are when someone illegally tries to gain access to a network or a computer.
  
 __Keylogging__:​ __Keylogging__:​
 +Keylogging is when keystrokes are recorded over the Internet to obtain a user account and password information.
  
 __Logic Bomb__: __Logic Bomb__:
 +A Logic Bomb is a virus that lays dormant until an event triggers it such as a date, user action, or a random trigger.
  
 __Phishing__:​ __Phishing__:​
 +Phishing is when a user receives an email to go to a website and "​fix"​ their account but entering their account name and password. Many people fall for these types of attacks thinking that the website they are visiting is legit.
  
 __Pod Slurping__: __Pod Slurping__:
Line 61: Line 61:
  
 __Script Kiddies__: __Script Kiddies__:
 +Script Kiddies is a term that hackers use for white hat hackers that find system vulnerabilities and fix them. The reason for the name Scipt Kiddy is used to describe young or inexperienced hackers who can be as dangerous and annoying as other hackers.
  
 __Sidejacking__:​ __Sidejacking__:​
Line 70: Line 70:
  
 __Social Engineering__:​ __Social Engineering__:​
 +Social engineering is when someone tries to obtain private data by illegally persuading an individual to give up their important information.
  
 __Trojan Horse__: __Trojan Horse__:
 +A Trojan Horse is when a seemingly harmless application is downloaded to a computer but then that application opens up a backdoor in to the computer for a hacker.
  
 __Virus__: __Virus__:
 +A Virus is an application that destroys or renders useless a computer. It is actually a felony to intentionally destroy another computer.
  
 __White Hat__: __White Hat__:
Line 84: Line 84:
 A worm is a virus that slowly makes a computer useless or too slow to use. It can either alter data on the computer or erase it. A worm is a virus that slowly makes a computer useless or too slow to use. It can either alter data on the computer or erase it.
  
-See e.g.:+---- 
 +{{:​ci2011:​thumbnail.aspx.jpeg|}} 
 +  * The best way to protect yourself from security attacks is to make sure your network, computer, and or cellphone is secure. Try using a secure password that is at least 8 digits in length and is both alpha-numeric and a symbol of some sort. You can even use a capital letter to help make your password more secure. Also, try to change your password every 30 days or so. But do not write your password down or keep it in a file on the computer. Make sure the password is one that is both secure and easy to remember. 
 +  * When using a wireless router make sure to using WPA2 for security. WEP and WPA can both be hacked. WPA2 can be hacked as well but it is much harder to do so and takes great effort. 
 +  * Install a well-known antivirus application on your computer such as AVG, McAfee, or Norton Anti-virus. Remember that only one antivirus application can be installed at one time. 
 +  * Another thing to do is change the administrator password on your computer if it is a Windows computer. If you don't change the administrator password it will be the default password which will allow someone to access your computer. Also, disable remote computing on your computer as this is another way for someone to gain access to your computer. 
 +  * Disabling bluetooth when it is not being used is also a safe way to safeguard your computer or cellphone. Bluetooth allows for bluetooth devices to connect to your computer or cellphone. As is described up above bluetooth can be a way for someone to connect to your computer or cellphone and access data and cause problems. 
 + 
 +References:
 http://​lifehacker.com/​5749098/​the-computer-attacks-youve-never-heard-of http://​lifehacker.com/​5749098/​the-computer-attacks-youve-never-heard-of
 +http://​www.windowsecurity.com/​whitepapers/​Wireless-Security-Attacks-Defenses.html
 +http://​www.comptechdoc.org/​independent/​security/​recommendations/​secattacks.html
  
ci2011/security_attacks.1299264073.txt.gz · Last modified: 2011/03/04 13:41 (external edit)