Which of the following terms refers to someone who accesses a computer or network illegally?

Which of the following involves the use of computers to observe, record, and review an employee’s use of a computer, including communications such as email messages, keyboarding activity, and websites visited?


  • job spamming
  • employee indexing
  • employee monitoring
  • manager filtering

Example of issues

Hacker

The term hacker, although originally a complimentary word for a computer enthusiast, now has a derogatory meaning and refers to someone who accesses a computer or network illegally. Some hackers claim the intent of their security breaches is to improve security.

Which of the following terms refers to someone who accesses a computer or network illegally?


Cracker

A cracker also is someone who accesses a computer or network illegally but has the intent of destroying data, stealing information, or other malicious action. Both hackers and crackers have advanced computer and network skills.

Script Kiddie

A script kiddie has the same intent as a cracker but does not have the technical skills and knowledge. Script kiddies often are teenagers that use prewritten hacking and cracking programs to break into computers.

Cyberextortionist

A cyberextortionist is someone who uses e-mail as a vehicle for extortion. These perpetrators send a company a threatening e-mail message indicating they will expose confidential information, exploit a security flaw, or launch an attack that will compromise the company's network - if they are not paid a sum of money.

Which of the following terms refers to someone who accesses a computer or network illegally?


Virus

A computer virus is a potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user's knowledge or permission. Once the virus infects the computer, it can sperad thoughout and may damage files and system software, including the operating system.


Worm

A worm is a program that copies itself repeatedly, for example in memory or on a network, using up resources and possibly shutting down the computer or network.

Trojan Horse

A Trojan horse (named after the Greek myth) is a program that hides within or looks like a legitimate program. A certain condition or action usually triggers the Trojan horse. Unlike a virus or worm, a Trojan horse does not replicate itself to other computers.

Which of the following terms refers to someone who accesses a computer or network illegally?


Solution for those issues

Methods that guarantee a computer or network is safe from computer viruses, worms, and Trojan horses simply do not exist.

-Do not start a computer with removable media inserted in the drivers or plugged in the ports.

-Never open an e-mail attachment unless you are expecting the attachment and it is from a trusted source.

-Users should install an antivirus program and update it frequently.

-A back door is a program or set of instructions in a program that allow users to bypass security controls when accessing a program, computer, or network.

-Spoofing is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network.

-A firewall is a hardware and/or software that protects a network's resources from intrusion by users on another network such as the Internet.