Fundamentals of Programming
Fundamentals of Programming
Fundamentals of Programming
2. Differentiate among hackers, crackers, script kiddies, cyberextortions, and cyberterrorists. Identify
issues with punishing cybercriminals.
Hackers
An individual who uses computers to gain access to unauthorized data
Cracker
An outdated term used to describe someone who bypasses passwords, licenses,
computer systems, intentionally breaching computer security.
Cyberextortion
Occurs when cybercriminals target a business/company and threaten to disable
operations or compromise confidential data unless they receive payment.
Cyberterrorism
A politically motivated use of information technology to cause disruption or
instill fear in society.
Identify issues with punishing cybercriminals
Risks
Exposure to Viruses and Malware/Ransomware
Cyberbullying and harassment
Online predators
Privacy issues
Leaking of personal information on devices
Identity theft
Phishing
Safety measures
Use strong passwords for your accounts
Keep your personal information confidential
Think before you click/click with caution
Only trust legitimate websites
Keep your operating system up to date
Botnet
Is a network of computers that is infected by malware or malicious software
controlled by a single group.
Zombie
A computer connected to a network that is compromised by a hacker, virus or
trojan
Bot
A software or application designed to execute a specific task without human
intervention.
5. Describe the damages caused by and possible motivations behind DoS and DDoS
attacks.
6. Define the term, spoofing. How can you tell if an email is spoofed?
What is spoofing?
Occurs when someone impersonates a trusted contact or brand.
The act of impersonating someone to access sensitive information
How can you tell if an email is spoofed?
Check email header
Check for unfamiliar links or attachments
Check for unsolicited request of personal information
Contact the supposed sender to confirm the legitimacy of the email
9. Define the terms, firewall and proxy server. List steps to set up a personal firewall.
Firewall – monitors and filters incoming and outgoing network traffic. Shields the
computer or network from malicious software or cyber-attacks.
Proxy server – serves as an intermediate between a user and the internet. A proxy
redirects your internet connection via a server. It keeps the user’s IP address hidden as
well as their location and identity.
Phishing – steals user data and login credentials and credit card numbers
Hacking – seeks to compromise digital devices. Hackers can gain access to
private information with the use of malicious software
Guessing passwords – some individuals try to guess passwords to networks or
another individual’s account.
11. Explain how an organization uses access controls and audit trails.
An access control is a security measure that defines who can access a device or
network.
An audit trail records in a file both successful and unsuccessful access attempts
to a device or network.
12. Differentiate among user names, passwords, passphrases, and pass codes.
Possessed objects
An item that can be used to gains access a computer or computer facility (cards,
badges, etc.)
Biometric device
Is an electronic device that identifies and verifies individuals. (Finger print
scanner, facial recognition terminal, etc.)
Risks
1. Exposure to cyber attacks
2. Exposure to malware/malicious software
3. Data/privacy breach
anywhere-games.com
galacticflashgames.com
gamefactoryinteractive.com
games-digest.com
mariogamesplay.com
towerofdefense.com
The article states that the websites listed above had malicious software that attacked online users who
have disabled their anti-virus software in order to free up CPU resources while gaming.
Minecraft
The Sims 4
Fortnite
Counter-Strike GO
Rocket League
League of Legends
FIFA 21