What is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network?

Academia.edu no longer supports Internet Explorer.

To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.

🏠

Home

Subjects

Math

🧪

Science

🏛️

History

📺

Arts & Humanities

🤝

Social Studies

💻

Engineering & Technology

💰

Business

📚

Other

Resources

📓

Study Guides

🏆

Leaderboard

💯

All Tags

Unanswered

🔀

Random Tags

📱

Computer Networking iPhone 3GS iPhone 3G

14.____ is a technique intruders use to make their network or Internet transmission appear legitimate to a victimcomputer or network.a.Rebukingc.Transmittingb.Spoofingd.Victimizing

____15.All networked and online computer users should implement a ____ like the one shown in the accompanyingfigure.

Get answer to your question and much more

____16.As shown in the accompanying figure, a ____ is hardware and/or software that protects a network’s resourcesfrom intrusion by users on another network such as the Internet.

Get answer to your question and much more

____17.____ detection software automatically analyzes all network traffic, assesses system vulnerabilities, identifiesany unauthorized access (intrusions), and notifies network administrators of suspicious behavior patterns orsystem breaches, including violations of firewalls like the ones in the accompanying figure.

Get answer to your question and much more

Related Textbook Solutions

See more

____18.____ is a server outside a company’s network that controls which communications pass into the company’snetwork.a.A firewallc.A proxy serverb.Intrusion detection softwared.An audit trail

____19.Which of the following is not true of intrusion detection software?

Get answer to your question and much more

____20.Many systems implement access controls using a two-phase process called ____.

Get answer to your question and much more

____21.If a password used on a site like the one shown in the accompanying figure is 4 characters long, the averagetime it would take a computer to discover the password is ____.

Get answer to your question and much more

____22.As shown in the accompanying figure, many Web sites require a user to enter a user ____, which is a uniquecombination of characters, such as letters of the alphabet or numbers, that identifies one specific user.a.termc.nameb.linkd.key

____23.As shown in the accompanying figure, many Web sites require a user to enter a(n) ____, which is a privatecombination of characters associated with a user name that allows access to certain computer resources.

Get answer to your question and much more

____24.Which of the following is an example of a possessed object?

Get answer to your question and much more

b.face recognition systemsd.fingerprint scanner____

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 21 pages?

Upload your study docs or become a

Course Hero member to access this document

Computer Science, Computer program

🏠

Home

Subjects

Math

🧪

Science

🏛️

History

📺

Arts & Humanities

🤝

Social Studies

💻

Engineering & Technology

💰

Business

📚

Other

Resources

📓

Study Guides

🏆

Leaderboard

💯

All Tags

Unanswered

🔀

Random Tags

📱

Computer Networking iPhone 3GS iPhone 3G

Computer Viruses, Worms, Trojan Horses, and Rootkits

• A computer virus is a potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user’s knowledge or permission.

• A worm is a program that copies itself repeatedly, for example in memory or on a network, using up resources and possibly shutting down the computer or network.

• A Trojan horse (named after the Greek myth) is a program that hides within or looks like a
legitimate program. A certain condition or action usually triggers the Trojan horse.

• A rootkit is a program that hides in a computer and allows someone from a remote location to take full control of the computer. Once the rootkit is installed, the rootkit author can execute programs, change settings, monitor activity, and access files on the remote computer.

Safeguards against Computer Viruses and Other Malware
1. Never start a computer with removable media inserted in the drives or plugged in the ports, unless the media are uninfected.
2. Never open an e-mail attachment unless you are expecting it and it is from a trusted source.
3. Set the macro security in programs so that you can enable or disable macros. Enable macros only if the document is from a trusted source and you are expecting it.
4. Install an antivirus program on all of your computers. Update the software and the virus signature files regularly.
5. Scan all downloaded programs for viruses and other malware.
6. If the antivirus program flags an e-mail attachment as infected, delete or quarantine the attachment immediately.
7. Before using any removable media, scan the media for malware. Follow this procedure even for shrink-wrapped software from major developers. Some commercial software has been infected and distributed to unsuspecting users.
8. Install a personal firewall program.
9. Stay informed about new virus alerts and virus hoaxes.

Botnets



            A botnet is a group of compromised computers connected to a network such as the Internet that are used as part of a network that attacks other networks, usually for nefarious purposes. A compromised computer, known as a zombie, is one whose owner is unaware the computer is being controlled remotely by an outsider. Cybercriminals use botnets to send spam via e-mail, spread viruses and other malware, or commit a denial of service attack.

Denial of Service Attacks

            A denial of service attack, or DoS attack, is an assault whose purpose is to disrupt computer access to an Internet service such as the Web or e-mail. Perpetrators carry out a DoS attack in a variety of ways. For example, they may use an unsuspecting computer to send an influx of confusing data messages or useless traffic to a computer network. The victim computer network slows down considerably and eventually becomes unresponsive or unavailable, blocking legitimate visitors from accessing the network.

           Perpetrators have a variety of motives for carrying out a DoS attack. Those who disagree with the beliefs or actions of a particular organization claim political anger motivates their attacks. Some perpetrators use the attack as a vehicle for extortion. Others simply want the recognition, even though it is negative.

Back Doors

           A back door is a program or set of instructions in a program that allow users to bypass security controls when accessing a program, computer, or network. Once perpetrators gain access to unsecure computers, they often install a back door or modify an existing program to include a back door, which allows them to continue to access the computer remotely without the user’s knowledge.

Spoofing

          Spoofing is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. E-mail spoofing occurs when the sender’s address or other components of the e-mail header are altered so that it appears the e-mail originated from a different sender. E-mail spoofing commonly is used for virus hoaxes, spam, and phishing scams. IP spoofing occurs when an intruder computer fools a network into believing its IP address is associated with a trusted source. Perpetrators of IP spoofing trick their victims into interacting with a phony Web site.

Safeguards against Botnets, DoS Attacks, Back Doors, and Spoofing

          To defend against botnets, DoS attacks, improper use of back doors, and spoofing, users can implement firewall solutions and install intrusion detection software.

Firewalls

          A firewall is hardware and/or software that protects a network’s resources from intrusion by users on another network such as the Internet.

          Organizations use firewalls to protect network resources from outsiders and to restrict employees’ access to sensitive data such as payroll or personnel records. Large organizations often route all their communications through a proxy server, which is a component
of the firewall. Home and small office/home office users often protect their computers with a personal firewall utility. A personal firewall is a utility program that detects and protects a personal computer and its data from unauthorized intrusions. 


          Some small office/home office users purchase a hardware firewall, such as a router or other device that has a built-in firewall, in addition to or instead of personal firewall software. 

Intrusion Detection Software

           To provide extra protection against hackers and other intruders, large organizations sometimes use intrusion detection software to identify possible security breaches. Intrusion detection software automatically analyzes all network traffic, assesses system vulnerabilities, identifies any unauthorized access (intrusions), and notifies network administrators of suspicious behavior patterns or system breaches.

           To utilize intrusion detection software requires the expertise of a network administrator because the programs are complex and difficult to use and interpret. These programs also are quite expensive.

14.____ is a technique intruders use to make their network or Internet transmission appear legitimate to a victimcomputer or network.a.Rebukingc.Transmittingb.Spoofingd.Victimizing

🏠

Home

Subjects

Math

🧪

Science

🏛️

History

📺

Arts & Humanities

🤝

Social Studies

💻

Engineering & Technology

💰

Business

📚

Other

Resources

📓

Study Guides

🏆

Leaderboard

💯

All Tags

Unanswered

🔀

Random

Tags

📱

Computer Networking iPhone 3GS iPhone 3G

0

Wiki User

∙ 6y ago

Best Answer

Copy

spoofing

Wiki User

∙ 6y ago

This answer is:

Study guides

Add your answer:

Earn +20 pts

Q: What is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network?

Write your answer...

Submit

Still have questions?

Related questions

People also asked

Study Guides

Computer Networking

Created By Anais Greenfelder

4.2

109 Reviews

Computer Networking

Created By Violette Cummerata

4.2

5 Reviews

Business and Industry

Created By Fatima Ziemann

4.4

14 Reviews

Business and Industry

Created By Merlin Ankunding

4.7

3 Reviews

Trending Questions

How do you get 1000000 robux for free?

Asked By Wiki User

What country is 1200 miles from Mexico?

Asked By Wiki User

How do you say i love you backwards?

Asked By Wiki User

Why are poets poor?

Asked By Wiki User

Who was Cindy murdock married to before david murdock?

Asked By Wiki User

What happened to Scott zolak's eye?

Asked By Wiki User

There is a bus with 7 children inside. Each child has 7 bags. Inside each bag there are 7 big cats. Each big cat has 7 small cats. All cats have 4 legs each. How many legs are on the bus?

Asked By Wiki User

Is 7g greater than 698 mg?

Asked By Wiki User

Still have questions?

Previously Viewed

What is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network?

Asked By Wiki User

Unanswered Questions

What are the major events in south India during 1390 and 1410?

Asked By Wiki User

Are Jesse and mel metcalfe brothers?

Asked By Wiki User

Why is fibula homologous to ulna?

Asked By Wiki User

What was the attitude of different people towards the separate amenities act or law during apartheid?

Asked By Wiki User

What type of pinwheel is more sensitive to a wind source?

Asked By Wiki User

How did biographer Rafael palma describe rizal?

Asked By Wiki User

What are the implications of providing email facilities to individuals in workplace?

Asked By Wiki User

What Bond is sih3br?

Asked By Wiki User

Subjects

Math Science History Business Arts & Humanities Social Studies Engineering & Technology Other Arts & Entertainment Sciences Humanities All Subjects

Top Categories

Algebra Chemistry Biology World History English Language Arts Psychology Computer Science Economics

Company

About Meet the Team Blog Contact Us

Product

Community Guidelines Honor Code Flashcard Maker Study Guides Math Solver FAQ

Legal

Terms of Use Privacy Policy Disclaimer Cookie Policy IP Issues

Made with 💙 in St. Louis

Copyright ©2022 System1, LLC. All Rights Reserved. The material on this site can not be reproduced, distributed, transmitted, cached or otherwise used, except with prior written permission of Answers.

CH5 Cyber Security Vocab.

A technique intruders used to make their network or Internet transmission appear legitimate to victim computer or network. A vulnerable computer that is set up to entice an intruder to break into it. The use of a computer or network without permission.

A firewall is a security device — computer hardware or software — that can help protect your network by filtering traffic and blocking outsiders from gaining unauthorized access to the private data on your computer.

What is the term for a website that uses encryption techniques to protect its data? Secure site.

What hardware protects a computer or network from intruders?

A firewall is hardware and/or software that is used to protect a computer or private network resources from intruders or hackers who might try to break into those systems.

Which of the following is someone who uses the Internet or network to destroy or damage computers for political reasons?

Glossary
cybercrime
Online or Internet-based illegal acts.
cyberextortionist
Someone who uses e-mail as a vehicle for extortion.
cyberterrorist
Someone who uses the Internet or network to destroy or damage computers for political reasons.
decrypt
Process of deciphering encrypted data into a readable form.
Student Resource Glossary - Cengagewww.cengage.com › cgi-wadsworth › course_products_wpnull

What is the term for a website that uses encryption techniques to protect its data?

What is the term for a website that uses encryption techniques to protect its data? Secure site.

Which term is used to describe software used by cyber criminals?

Malware, short for “malicious software,” refers to any intrusive software developed by cybercriminals (often called “hackers”) to steal data and damage or destroy computers and computer systems. Examples of common malware include viruses, worms, Trojan viruses, spyware, adware, and ransomware.