꿈을꾸는 파랑새

오늘 보니 세계적인 보안업체인 TrustPort에서 보안상식을 묻는 프로모션을 제공을 하고 있습니다. 일단 기본적인 프로모션 참여방법은 간단합니다. 먼저 해당 프로모션에서 5문제를 풀면 됩니다. 문제는 간단하게 파밍, 피싱, 스파이웨어, 다이얼, 하이재킹등에 관한 내용에서 빈칸에 적당한 영어단어를 입력하는 방식으로 진행됩니다. 일단 같은 숫자는 같은 영어 단어로 구성돼 있고 해당 문제 중 5가지 문제를 풀고 나면 TrustPort USB Antivirus 1년 라이센스,TrustPortAntivirus 6개월 사용권, Trust Port Total Protection 70% 할인권 중 하나를 선택할 수가 있습니다. 어떤 것을 선택하든 사용자 선택이겠지만 70% 할인된 가격에 Trust Port Total Protection 프로모션을 통한 가격을 할인을 받아서 저렴하게 구매를 하는 것도 좋은 방법의 하나일 것입니다. 그리고 해당 이벤트 정답을 한번 읽어보면 보안 상식을 늘리는데 도움을 받을 수가 있을 것입니다.

TrustPort 보안 상식 이벤트

<이벤트 정답>

MALWARE IS software used or programmed by attackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems. MALWARE IS a general term used to refer to a variety of harmful code


SHOULDER SURFING refers to using direct observation techniques, such as looking over someone’s shoulder, to get information. It is commonly used to obtain passwords, PINs, security codes, and similar data. SHOULDER SURFING IS particulary effective in crowded places because it is relatively easy to observe anybody


PHARMING IS a hacker’s attack aiming to redirect a website’s traffic to another bogus website. Pharming can be conducted either by changing the hosts file on a victim’s computer or by exploitation of a vulnerability in DNS server software. PHARMING HAS become of major concern to businesses hosting e-commerce and online banking websites


A TROJAN HORSE can be easily and unwittingly downloaded. For example, if a computer game is designed in a way that when opened by the user, it opens a back door that allows a hacker to control the computer of the user, then the computer game is said to be a TROJAN


HIJACKING IS the modification of a web browser’s settings by a malware, spyware or a virus. A browser HIJACKER may replace the existing web page with its own. These are generally used to force hits to a particular website. Some browser HIJACKING can be easily reversed, while other instances may be difficult to reverse


RANSOMWARE comprises a class of malware which restricts access to the computer system that it infects, and demands a RANSOM paid to the creator of the malware in order for the restriction to be removed. Some forms of RANSOMWARE encrypt files on the system’s hard drive, while some may simply lock the system and display messages intended to coax the user into paying


BOTNET IS a term for a collection of software bobots, or bots, that run autonomously and automatically. A botnet’s originator can control the group, remotely and usually for bad purposes. More experienced botnet operators program their own commanding protocols from scratchSKIMMING IS the theft of credit card information used in an otherwise legitimate transaction. The thief can procure a victim’s credit card number using basic methods such as photocopying receipts or more advanced methods such as using a small electronic device (Skimmer) to swipe and store hundreds of victims’ credit card numbers


DIALLER IS a malicious program that changes Internet access via a modem. It diverts dial numbers to lines with excessively high rates. Users usually only discover this once they receive a phone bill which is unusually high. However, with the growth of permanent Internet connections as ADSL or Wi-Fi, this form of malware is slowly fading


PASSWORD CRACKING IS the precess of recovering passwords from data that have been stored in your computer. The purpose of PASSWORD CRACKING MIGHT be to help a user recover a forgotten password or to gain unauthorized access to a system


SPYWARE IS mostly used for purposes such as tracking and storing internet user’s movements on the web and serving up pop-up ads to internet users. SPYWARE CAN collect almost any type of data, including internet surfing habits, user logins, and bank account or credit card information


ADWARE IS any software package which automatically gives advertisements in order to generate revenue. The advertisements may be in the user interface of the software or on a screen presented to the user during the installation process. The functions may be designed to analyze which Internet sites the user visits and to present advertising options to the types of goods or services featured


KEYSTROKE LOGGING, often referred to as KEYLOGGIOG, is the action of recording or logging keys struck on a keyboard, typically so that the person using the keyboard is unaware that their actions are being monitored. This means the attacker can easily gain sensistive information such as passwords


BAITING IS like the real-world Trojan Horse that uses physical media and relies on the curiosity of the victim. The attacker leaves a malware infected USB flash drive in a location sure to be found and gives it a legitimate looking label, and waits for the victim to use the infected device. If a user inserts this device into their PC, they will install malware without knowing


그리드형

공유하기

facebook twitter kakaoTalk kakaostory naver band