Ch 8 Text Flashcards
What is identity theft?
A crime in which an imposter obtains key pieces of personal information, such as social security numbers, driver’s license numbers, or credit card numbers, to impersonate someone else
What is phishing?
Involves setting up fake websites or sending e-mail messages that look like those of legitimate businesses to ask users for confidential personal data
The e-mail instructs recipients to update or confirm records by providing social security, bank and credit card information, and other confidential data either by responding to the e-mail, by entering the information at a bogus website, or calling a telephone number
What is an evil twins attack?
Wireless networks that pretend to offer trustworthy Wi-fi connections to the Internet, such as those in airport lounges, hotels, or coffee shops
Looks identical to the public network
What is pharming?
Redirects users to a bogus web page, even when the individual types the correct web page address in their browser
What is click fraud?
Occurs when an individual or computer program fraudulently clicks an online ad without any intention of learning more about the advertiser or making a purchase
What is cyberwarfare?
A state-sponsored activity designed to cripple and defeat another state or nation by penetrating its computers or networks to cause damage and disruption
What are some mitigating controls?
Authentication
Passwords
Token
Biometric Authentication
Two-Factor Authentication
Firewalls
Intrusion Detection System
Antivirus Software
What is authentication?
Refers to the ability to know that a person is who he or she claims to be
What are passwords?
Known only to authorized users, used to log on to a computer and system
What is a token?
A physical device, similar to an identification card, that is designed to prove the identity of a single user
What is biometric authentication?
Uses systems that read and interpret individual human traits, such as fingerprints, irises, and voices to grant or deny access
What is two-factor authentication?
Increases security by validating users through a multi-step process
What is a firewall?
Prevent unauthorized users from accessing private networks; a combination of hardware and software that controls the flow of incoming and outgoing network traffic
What is an intrusion detection system?
Full-time monitoring tools placed at the most vulnerable points or hotspots of corporate networks to detect and deter intruders continually
What is antivirus software?
Prevents, detects, and removes malware, including computer viruses, computer worms, Trojan horses, spyware, and adware