12 - Information Security Management Flashcards
Advanced Persistent Threat (APT)
A sophisticated, possibly long-running computer hack that is perpetrated by large, well-funded orgs like governments.
APTs are means to engage in cyber warfare.
Adware
Programs installed on user comp without knowledge or permission
Reside in the background and unknown to the user, observer user’s actions and keystrokes, modify comp. activity, and report the user’s activities to sponsoring orgs.
Most adware is benign in that it does not perform malicious acts or steal data. It does, however, watch user activity and produce pop-up ads.
Asymmetric Encryption
An encryption method whereby diff. keys are used to encode and decode the message. (Need 2 diff codes)
ie. Public/private keys
Authentication
The process whereby an information system verifies (Validates) a user.
Biometric authentication
The use of personal physical characteristics, such as fingerprints, facial features, and retinal scans, to authenticate users.
Brute Force Attack
A password-cracking program that tries every possible combination of characters.
Cookies
A small file that is stored on the user’s computer by a browser.
Cookies can be used for authentication, for storing shopping cart contents and user preferences, and other legitimate purposes.
Cookies can also be used to implement spyware (323)
Data administration
An organization-wide function that developes and enforces data policies and standards.
Data safeguards
Measures used to protect databases and other data assets from threats. Includes data rights and responsibilities, encryption, backup and recovery, and physical security.
DataBASE administration
A person or department that develops procedures and practices to ensure efficient and orderly multiuser processing of the database, to control changes to database structure, and protect the database.
Denial of Service
DOS
Security problem in which users are not able to access an information system
Can be caused by human errors, natural disasters, or malicious activity
Drive-by sniffer
A person who takes a computer with a wireless connection through an area and searches for unprotected wireless networks in an attampt to gain free internet access, or gather unauthorized data.
Email spoofing
Synonym for phishing
Technique for obtaining unauthorized data that uses pretexting via email. The phisher pretends to be a legitimate company, and sends email requests for confidential data, such as account numbers, Social Sec. numbers, account passwords, etc.
Phishers direct traffic to their sites under the guise of legitimate business.
Encryption
The process of transforming clear text into coded, unintelligible text for secure storage or communication.
Encryption Algorithms
Algorithms used to transform clear text into coded, unintelligible text for secure storage or communication.
FIDO
First Identity OnLine
A set of open standards and protocols under development as an alternative to password authentication.
Firewall
Computer devices located between public and private networks that prevent unauthorized access to or from the internal network.
A firewall can be a special-purpose computer or it can be a program or general-purpose computer or on a router.
Hacking
A form of computer crime in which a person gains unauthorized access to a computer system.
Although some people hack for the sheer joy of doing it, other hackers invade systems for the malicious purposes of stealing or modifying data.
https
An indication that a Web browser is using the SSL/TLS protocol to provide secure communication.
Human safeguards
Steps taken to protect against security threats by establishing appropriate procedures for users to follow during system use.
Identification
The process whereby an information system identifies a user by requiring the user to lsign on with a username and password.