chap 1 part 2 Flashcards

1
Q

intellectual property (IP)?

A

information owned by a company and protected by law (copyrights, etc.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

trade secrets?

A

company plans, customer lists, price lists, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

malware?

A

evil software: computer virus, worms, trojans, RATS (remote access Trojans) spam, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

viruses?= work how/?

A

spread through email by attaching themselves to other legitimate programs such as emails, text, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

worms?

A

full programs do not attach to other programs. uses security flaw in computers and then uses Direct Propagation to spread on own between all connected computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

blended threats?

A

malware propagates via compromised webpages containing mobile code, viruses, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

payloads?

A

pieces of code that do damage (malicious payload = heavy damage) goes into effect after certain parameters are met. implemented via worms/ viruses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

blended threats?

A

malware propagates via compromised webpages containing mobile code/ viruses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

direct propagation worm is what?

A

a worm that takes advantage of a computers security flaw and self propagates to all connected computers. everything can be infected in 10 minutes. the mere self propagation can cause networks to crash due to the bandwidth usage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

mobile malware?

A

spreads via email attachments, (virus) self propagating worms or blended threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

non-mobile malware?

A

trojan horses/ root kits. placed by hacker on a computer, by a virus. part of payload, social engineering (tricked into downloading). or when webpages are downloaded.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Trojan horse?

A

a program that deletes a system file then re-names itself after said file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Remote access Trojans?

A

hidden Trojan that allows a computer to be controlled remotely for malicious use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

spyware?

A

cookies, key loggers, password stealing software. data mining. (Trojan horse programs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

rootkit?

A

a set of software tools that enable an unauthorized user to gain control of a computer system without being detected. (hides from the root or admin)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

down loaders?

A

small Trojan that is downloaded then allows larger Trojan horse to be installed

17
Q

root accounts?

A

administrator account on unix computers

18
Q

spyware (password stealing)

A

logs you out of a website/ database then asks for log in information that is sent to the attacker. (can look like legit website)

19
Q

data mining software?

A

Trojan that looks for password and username or other personal information on your hard drive. information is sent to attacker.

20
Q

spear phishing?

A

spam attacks aimed at individuals or groups.

21
Q

phishing?

A

spam attacks that look like authentic emails.

22
Q

mobile code?

A

executable code on a web-page (java, etc.) if pc has security vulnerability then code does malicious act.

23
Q

when are trade secrets protected by law?

A

only when a company tries to make a reasonable effort to keep them secret through standards in the IT security community.

24
Q

trade secret espionage?

A

a competitor company buys or solicits employee trade secret information, hacks servers, intercepts communications etc.