Chapter 1 Flashcards

1
Q

threat environment

A

consists of the types of attackers and attacks that companies face

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

confidentiality

A

people cannot read sensitive information, either while its on a computer or traveling across a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

integrity

A

attackers can’t change/destroy info, either while on a computer or traveling across a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

availability

A

the people who are authorized to use info aren’t prevented from doing so

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

compromises

A

successful attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

countermeasures

A

tools used to thwart attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

3 types of countermeasures

A

preventative
detective
corrective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SQL injection

A

an attack that involves sending modified SQL statements to a web application that will modify a database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

unexpected input

A

what attackers can send through their web browser which can enable them to read from, write to, and even delete entire databases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

employees/ex-employees are dangerous because

A

they have knowledge of internal systems, permission to access systems, how to avoid detection, and are trusted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

employee sabotage

A

destruction of hardware, software, or data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

employee hacking

A

intentionally accessing a computer resource without authorization or in excess of authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

employee financial theft

A

misappropriation of assets; theft of money

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

employee theft of intellectual property

A

copyright and patents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

employee extortion

A

perpetrator tries to obtain money or other goods by threatening to take actions that would be against the victim’s interest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

carelessness

A

loss or theft of computers or data media containing sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

malware

A

a generic name for any evil software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

virus

A

program that attaches itself to legitimate programs on the victim’s machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

worms

A

full programs that do not attach themselves to other programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

blended threats

A

malware propagates in several ways– like worms, viruses, etc.

21
Q

payloads

A

pieces of code that do damage

22
Q

nonmobile malware

A

must be placed on the user’s computer through one of a growing number of attack techniques

23
Q

trojan horse

A

program that replaces an existing system file, taking its name

24
Q

remote access trojans

A

remotely control the victim’s PC

25
downloaders
small trojan horses that download the larger trojan horses after the downloader is installed
26
spyware
programs that gather info about you and make it available to the adversary
27
rootkits
take control of the super user account, difficult to detect
28
mobile code
executable code on a webpage (automatically when the webpage is downloaded)
29
social engineering
attempting to trick users into doing something that goes against security policies
30
traditional hackers
motivated by the thrill, validation of skills, and sense of power
31
first thing to do in a hack
reconnaissance probes
32
reconnaissance probes
IP address scans to identify possible victims and the port scans to learn which services are open on each potential victim host
33
the exploit of a hack
this is the specific hack method the attacker is using
34
chain of attack computers
the attacker attacks through a chain of victim computers
35
social engineering focuses on what kind of weakness?
human weakness
36
Denial-of-Service (DoS) attack
make a server or entire network unavailable to its users and typically sends a flood of attack messages to the victim
37
expert attackers create hacker _____ to automate some of their work
scripts
38
Script ______ use scripts to make attacks
kiddies
39
today most attackers are career criminals with
traditional criminal motives
40
fraud
the attacker deceives the victim into doing something against the victim's financial self-interst
41
extortion
threaten a DoS attack or threaten to release stolen info unless the victim pays the attacker
42
identity theft
stealing enough info to represent a victim in large transactions
43
corporate identity theft
stealing the identity of an entire corporation
44
commercial espionage
attacks on confidentiality and public info gathering
45
DoS attacks by competitors
attacks of availability
46
attacks by national govts are
cyberwar
47
attacks by organized terrorists are
cyberterror
48
cyberwar
computer-based attacks by national govts
49
cyberterror
attacks by terrorists or terrorist groups that use the internet to attack IT resources directly