Chapter 1 Flashcards

1
Q

Three levels of protection

A

Personal, Organizational, Government

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ISP

A

Internet Service Provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IoT

A

Internet of Things

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CIA Triad

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

White hat attackers

A

break into networks or computer systems to identify any weaknesses so that the security of a system or network can be improved. These break-ins are done with prior permission and any results are reported back to the owner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Gray hat attackers

A

may set out to find vulnerabilities in a system but they will only report their findings to the owners of a system if doing so coincides with their agenda. Or they might even publish details about the vulnerability on the internet so that other attackers can exploit it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Black hat attackers

A

take advantage of any vulnerability for illegal personal, financial or political gain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Hacktivists

A

make political statements to create awareness about issues that are important to them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

State-sponsored attackers

A

gather intelligence or commit sabotage on behalf of their government. They are usually highly trained and well-funded and their attacks are focused on specific goals that are beneficial to their government.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Stuxnet

A

Sign of the Times

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An individual user profile on a social network site is an example of an _____ identity.

A

online

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Cyberwarfare

A

is the use of technology to penetrate and attack another nation’s computer systems and networks in an effort to cause damage or disrupt services, such as shutting down a power grid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Spyware

A

Designed to track and spy on you, spyware monitors your online activity and can log every key you press on your keyboard, as well as capture almost any of your data, including sensitive personal information such as your online banking details. Spyware does this by modifying the security settings on your devices.

It often bundles itself with legitimate software or Trojan horses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Adware

A

Adware is often installed with some versions of software and is designed to automatically deliver advertisements to a user, most often on a web browser. You know it when you see it! It’s hard to ignore when you’re faced with constant pop-up ads on your screen.

It is common for adware to come with spyware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Backdoor

A

This type of malware is used to gain unauthorized access by bypassing the normal authentication procedures to access a system. As a result, hackers can gain remote access to resources within an application and issue remote system commands.

A backdoor works in the background and is difficult to detect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Ransomware

A

This malware is designed to hold a computer system or the data it contains captive until a payment is made. Ransomware usually works by encrypting your data so that you can’t access it.

Some versions of ransomware can take advantage of specific system vulnerabilities to lock it down. Ransomware is often spread through phishing emails that encourage you to download a malicious attachment or through a software vulnerability.

17
Q

Scareware

A

This is a type of malware that uses ‘scare’ tactics to trick you into taking a specific action. Scareware mainly consists of operating system style windows that pop up to warn you that your system is at risk and needs to run a specific program for it to return to normal operation.

If you agree to execute the specific program, your system will become infected with malware.

18
Q

Rootkit

A

This malware is designed to modify the operating system to create a backdoor, which attackers can then use to access your computer remotely. Most rootkits take advantage of software vulnerabilities to gain access to resources that normally shouldn’t be accessible (privilege escalation) and modify system files.

Rootkits can also modify system forensics and monitoring tools, making them very hard to detect. In most cases, a computer infected by a rootkit has to be wiped and any required software reinstalled.

19
Q

Trojan Horse

A

This malware carries out malicious operations by masking its true intent. It might appear legitimate but is, in fact, very dangerous. Trojans exploit your user privileges and are most often found in image files, audio files or games.

Unlike viruses, Trojans do not self-replicate but act as a decoy to sneak malicious software past unsuspecting users.

20
Q

Virus

A

A virus is a type of computer program that, when executed, replicates and attaches itself to other executable files, such as a document, by inserting its own code. Most viruses require end-user interaction to initiate activation and can be written to act on a specific date or time.

Viruses can be relatively harmless, such as those that display a funny image. Or they can be destructive, such as those that modify or delete data.

Viruses can also be programmed to mutate in order to avoid detection. Most viruses are spread by USB drives, optical disks, network shares or email.

21
Q

Worms

A

This is a type of malware that replicates itself in order to spread from one computer to another. Unlike a virus, which requires a host program to run, worms can run by themselves. Other than the initial infection of the host, they do not require user participation and can spread very quickly over the network.

Worms share similar patterns: They exploit system vulnerabilities, they have a way to propagate themselves, and they all contain malicious code (payload) to cause damage to computer systems or networks.

Worms are responsible for some of the most devastating attacks on the Internet. In 2001, the Code Red worm had infected over 300,000 servers in just 19 hours.