Chapt 9 Flashcards
what type of bio-metric sensor is on newer mobile devices?
fingerprint scanner
when someone goes through the trash to obtain sensitive info, that is called ?
dumpster diving
asking users to reveal sensitive or personal info over the phone is referred to as ______ _______?
social engineering
looking at someone’s computer to see sensitive info they type in or display is called what?
shoulder surfing
a problem in the coding of software that is used by an attacker is called what?
exploit
malware that attaches itself to an executable program and does damage to your computer is called what?
virus
malware that self-replicates and carries a payload of other malware is called what?
worm
a program that appears to be beneficial but is actually malware is called what?
trojan horse
malware that tracks your internet activity and sells that info to marketers is called what?
spyware
malware that extorts those infected to pay a fee to remove the malware is called what?
ransomware
excessive, unwanted email is referred to as what?
spam
if you forget a password, what type of software can help you recover it?
password cracker
the three types of intellectual property protection are what?
copyright, trade mark, patents
a(n) _____ is used for intellectual property protection of a logo, word or words
trademark
a(n) ____ is used for intellectual property protection of a book or a song.
copyright
a(n) ______ is used for intellectual property protection of an invention.
patent
what are five examples of confidentiality concerns?
snooping, eavesdropping, wiretapping, social engineering, and dumpster diving
what are four examples of integrity concerns?
man in the middle, replay attack, impersonation, unauthorized information alteration
what are five examples of availability concerns?
denial of service, power outage, hardware failure, destruction, service outage
in information security, a(n) __________ concern is one that involves maintaining privacy of data.
confidentiality
in information security, a(n) _______ concern is one that involves ensuring the data in true and accurate.
integrity
in information security, a(n) _______ concern is one that involves ensuring the data is accessible when users need it
availability
requiring another form of identification in addition to a password in order to log in is know as what?
multi factor authentication
list examples of authentication factors.
password, pin, one-time password, software token, hardware token, bio-metrics, specific location, security questions
when a user types a password once and is given access to multiple systems, what is that called?
single sign on
what security concept asks the question, ‘who are you’?
authentication
what security concept determines what you can do on a network?
authorization
when assigning security permissions, always follow the _______ _______ model.
least privilege
when users are allowed to assign their own permissions, that is known as a _____ access control model.
discretionary
when users are assigned permissions based on job function and can’t be assigned permissions based on their user account, that is known as a _______ access control model.
role-based
which access control model uses security labels, classifications, and categories?
mandatory access control
which security concept is responsible for tracking user actions on a system?
accounting
which security concept ensures that users can’t deny that an event took place?
nonrepudiation
two ways to track user actions on a system are what?
logs and web browser history
what are four examples of non-repudiation factors?
video, bio-metrics, signature, receipt