All Flashcards

1
Q

LOIC

A

Low Orbit ION Canon - Create large-scale

denial-of-service attacks with little knowledge required.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Reconnaissance Attacks and Tools

A

IP Probes, Port Scans, Vulnerability SCans

Nmap, Saint, Satan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Federal Sentencing guideline

A

Formalised the prudent man rule and applied it to informaton security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Federal Information security management act (FISMA)

A

Secuirty program that covers Agency & contractors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

National Information Infrastructure protection attack

A

Amend Computer Fraud and Abuse Act to include protections for the portions of national infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

CCTV

A

Technical Physical Control and also detective and deterrent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Screen Scraping

A

Used in 2 instances:
The idea is that the screen on the target machine is scraped and shown to the remote operator.
Second, screen scraping is a technology that can allow an automated tool to interact with a human interface. For example, Google requires that all searches be performed
through a Google web search form field.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Disaster - Restoration

A

Returns Business facilities and environments to a working state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Disaster -Recovery

A

Returns Business Operations and process to a working state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Phreaker tools

A

Black Box - Manipulate line voltages to steal long distance call
Red Box - Simulates tones of coins deposited in pay phone
Blue Box - simulate 2600 Hz tones to interact directly with telephone network trunk systems (that is, backbones). This could be a whistle, a tape recorder, or a
digital tone generator.
White Box - used to control the phone system. A white box is a dual-tone multifrequency (DTMF) generator (that is, a keypad)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Internal Investigation

A

Gather most variety of your information with voluntary surrender

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Polymorphic Virus

A

Changes the code as they travel from system to system. Destruction and propagation technique is the same but signature is slightly different.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Fourth Amendment

A

protect individuals against wiretapping and invasions of privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Admissible Evidence

A

Material, Relevant and Competent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Administrative law

A

Form of policies, procedures, and regulations that govern the daily operations of the agency.
Procedures to be used within a federal agency to obtain a desk telephone to more substantial issues such as the immigration policies that will be used to enforce the laws passed by Congress.
Code of Federal Regulations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Encrypted Virus

A

Use “Virus decryption routine” which has cryptographic information.
Uses different cryptographic keys to make the code different.
But they have telltale signature so that antivirus can identify it,

17
Q

Code Of ethics

A

1) Protect Society, the common good, necessary public trust, and confidence and infrastructure.
2) Act honorably, justly, responsibly and Legally
3) provide diligent and competent services to principals
4) Advance and Protect profession

18
Q

Family Education Rights and privacy Act (FERPA)

A

Rights of students and parents of minor students

19
Q

Security Triple

A

Relationship between Asset, Vulnerability and threat

20
Q

Real/Conclusive Evidence

A

Things that canbe brought to the court - murder weapon, clothing or physical object

21
Q

Documentary Evidence

A

Written items brought into court to prove a fact at hand and should be authenticated.

22
Q

Best Evidence Rule

A

Only original document and no copies are accepted

23
Q

Parol Evidence Rule

A

When agreement between parties is put into written form, the written document is assumed to contain all the terms of the agreement and no verbal agreements may modify the written agreement

24
Q

Chain of Evidence

A

■General description of the evidence
■ Time and date the evidence was collected
■ Exact location the evidence was collected from
■ Name of the person collecting the evidence
■ Relevant circumstances surrounding the collection

25
Q

Industrial Espionage

A

Business attack