5. Protecting Information Resources Flashcards

1
Q

Spyware

A

Gathers info about users on the web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Adware

A

Type of spyware that collects information about the user w/o user consent to determine ads to display in browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Phishing

A

Transmission of fraudulent emails that seem to come from legitimate sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Pharming

A

Directs internet users to fraudulent websites to steal their personal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Baiting

A

Similar to phishing, but the baiter promises the recipient something in return.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Quid pro quo

A

Similar to baiting, a hacker requests exhange of info for a service/prize

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Sniffing

A

Capturing and recording network traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Computer fraud

A

The unauthorized use of computer data for personal gain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Fault-tolerant systems

A

Ensure availability in the event of a system failure by using a combo of hardware and software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Virus

A

Self-propagating code triggered by a specified time or event.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Worm

A

Travels from computer to computer in a network, but does not erase data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Trojan programs

A

Contains code intended to disrupt a comp, network, or website, hidden within a popular program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Back door

A

Programming routine built into a system by its programmer. Enables programmer to bypass security & sneak into the system to access programs or files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Adware

A

is a form of spyware that collects information about the user (without the user’s consent) to determine which advertisements to display in the user’s Web browser.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Confidentiality

A

means that a system must prevent disclosing information to anyone who is not authorized to access it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Keystroke loggers

A

are software or hardware devices that monitor and record keystrokes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Computer fraud

A

is the unauthorized use of computer data for personal gain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Spoofing

A

is an attempt to gain access to a network by posing as an authorized user in order to find sensitive information, such as passwords and credit card information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Integrity

A

refers to the accuracy of information resources within an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Availability

A

means that computers and networks are operating, and that authorized users can access the information they need. It also means a quick recovery in the event of a system failure or disaster.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

logic bomb

A

A logic bomb is a type of Trojan program used to release a virus, worm, or other destructive code. Logic bombs are triggered at a certain time (sometimes the birthday of a famous person) or by a specific event, such as a user pressing the Enter key or running a certain program.

22
Q

blended threat

A

A blended threat is a security threat that combines the characteristics of computer viruses, worms, and other malicious codes with vulnerabilities found on public and private networks.

23
Q

rootkit

A

A rootkit is a series of software tools that enable an unauthorized user to gain access to a computer or network system without being detected.

24
Q

denial-of-service (DoS) attack

A

A denial-of-service (DoS) attack floods a network or server with service requests to prevent legitimate users’ access to the system.

25
Q

social engineering

A

takes advantage of the human element of a security system to trick others into revealing private information.

26
Q

callback modem

A

A callback modem verifies whether a user’s access is valid by logging the user off (after the user attempts to connect to the network) and then calling the user back at a predetermined number.

27
Q

Cryptojacking

A

occurs when hackers secretly use the computing power of a user to mine cryptocurrency.

28
Q

intrusion detection system (IDS)

A

An intrusion detection system (IDS) can protect against both external and internal access. It is usually placed in front of a firewall and can identify attack signatures, trace patterns, generate alarms for the network administrator, and cause routers to terminate connections with suspicious sources.

29
Q

firewall

A

A firewall is a combination of hardware and software that acts as a filter or barrier between a private network and external computers or networks, including the Internet. A network administrator defines rules for access, and all other data transmissions are blocked.

30
Q

Biometric security measures

A

use a physiological element that is unique to a person and cannot be stolen, lost, copied, or passed on to others.

31
Q

Physical security measures

A

primarily control access to computers and networks, and they include devices for securing computers and peripherals from theft.

32
Q

password

A

A password is a combination of numbers, characters, and symbols that a user enters to gain access to a system.

33
Q

DNA identification

A

gathers a user’s unique behavioral characteristics and then creates an “eDNA” profile that is used for identification when the user tries to log in to a system.

34
Q

Zero login

A

assumes that devices will be smart and secure enough to quickly recognize users by their unique features, such as their voice and their typing patterns.

35
Q

brain password

A

A brain password is a digital reading of a user’s brain activity while looking at a series of images. These brain activities are recorded in a database. To log in to a system or enter a secure room, the user puts on a special hat and again watches the sequence of images. The new brain activities are compared with the ones in the database and then access is given or denied.

36
Q

Access controls

A

are designed to protect systems from unauthorized access in order to preserve data integrity.

37
Q

Implanted microchips

A

a controversial technology, are microchips the size of a grain of rice that are inserted between the thumb and the index finger. The microchip can store various information, including that for a user’s ID cards and credit cards, which could be used to log in to Web sites and to enter a secure room.

38
Q

Authentication tokens

A

improve security by transmitting a security token among connected applications. The user logs in once with approved credentials, and then a unique token is generated and shared with connected applications or Web sites to verify the user’s identity for a given period.

39
Q

Transport Layer Security (TLS)

A

is a cryptographic protocol that ensures data security and integrity over public networks, such as the Internet.

40
Q

Data encryption

A

transforms data, called plaintext or cleartext, into a scrambled form called ciphertext that cannot be read by others.

41
Q

virtual private network (VPN)

A

A virtual private network (VPN) provides a secure “tunnel” through the Internet for transmitting messages and data via a private network.

42
Q

PKI (public key infrastructure)

A

A PKI (public key infrastructure) enables users of a public network such as the Internet to securely and privately exchange data through the use of a pair of keys—a public one and a private one—that is obtained from a trusted authority and shared through that authority.

43
Q

Secure Sockets Layer (SSL)

A

is a commonly used encryption protocol that manages transmission security on the Internet.

44
Q

Asymmetric encryption

A

uses two keys: a public key known to everyone and a private or secret key known only to the recipient. A message encrypted with a public key can be decrypted only with the same algorithm used by the public key and requires the recipient’s private key, too. Any people who intercept the message cannot decrypt it because they do not have the private key.

45
Q

Zero trust security

A

requires every person and every device that accesses a network to be secure, regardless of whether the access is within the organization or outside of it.

46
Q

symmetric encryption

A

In symmetric encryption (also called secret key encryption), the same key is used to encrypt and decrypt the message. The sender and receiver must agree on the key and keep it secret.

47
Q

business continuity planning

A

outlines procedures for keeping an organization operational after a natural disaster or network attack.

48
Q

Black hats

A

Hackers who specialize in unauthorized penetration of information systems. They attack systems for profit, fun, or political motivation or as part of a social cause. These penetration attacks often involve modifying and destroying data.

49
Q

Gray hats

A

As you might imagine, they are a mixture of black and white hacking. Gray hats may violate laws or ethical standards, but they do not have the malicious intent to harm a person or a system. They look for vulnerabilities in a system without the owner’s permission or knowledge. They may inform the owner that they have found vulnerabilities and will fix them for a small fee.

50
Q

Script kiddies

A

Inexperienced, usually young hackers who use programs that others have developed to attack computer and network systems and deface Web sites.

51
Q

White hats

A

Also known as ethical hackers, these are computer security experts who specialize in penetration testing and other testing methods to ensure that a company’s information systems are secure.