Chapter 1 Flashcards

1
Q

threat environment

A

consists of the types of attackers and attacks that companies face

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

confidentiality

A

people cannot read sensitive information, either while its on a computer or traveling across a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

integrity

A

attackers can’t change/destroy info, either while on a computer or traveling across a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

availability

A

the people who are authorized to use info aren’t prevented from doing so

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

compromises

A

successful attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

countermeasures

A

tools used to thwart attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

3 types of countermeasures

A

preventative
detective
corrective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SQL injection

A

an attack that involves sending modified SQL statements to a web application that will modify a database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

unexpected input

A

what attackers can send through their web browser which can enable them to read from, write to, and even delete entire databases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

employees/ex-employees are dangerous because

A

they have knowledge of internal systems, permission to access systems, how to avoid detection, and are trusted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

employee sabotage

A

destruction of hardware, software, or data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

employee hacking

A

intentionally accessing a computer resource without authorization or in excess of authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

employee financial theft

A

misappropriation of assets; theft of money

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

employee theft of intellectual property

A

copyright and patents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

employee extortion

A

perpetrator tries to obtain money or other goods by threatening to take actions that would be against the victim’s interest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

carelessness

A

loss or theft of computers or data media containing sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

malware

A

a generic name for any evil software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

virus

A

program that attaches itself to legitimate programs on the victim’s machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

worms

A

full programs that do not attach themselves to other programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

blended threats

A

malware propagates in several ways– like worms, viruses, etc.

21
Q

payloads

A

pieces of code that do damage

22
Q

nonmobile malware

A

must be placed on the user’s computer through one of a growing number of attack techniques

23
Q

trojan horse

A

program that replaces an existing system file, taking its name

24
Q

remote access trojans

A

remotely control the victim’s PC

25
Q

downloaders

A

small trojan horses that download the larger trojan horses after the downloader is installed

26
Q

spyware

A

programs that gather info about you and make it available to the adversary

27
Q

rootkits

A

take control of the super user account, difficult to detect

28
Q

mobile code

A

executable code on a webpage (automatically when the webpage is downloaded)

29
Q

social engineering

A

attempting to trick users into doing something that goes against security policies

30
Q

traditional hackers

A

motivated by the thrill, validation of skills, and sense of power

31
Q

first thing to do in a hack

A

reconnaissance probes

32
Q

reconnaissance probes

A

IP address scans to identify possible victims and the port scans to learn which services are open on each potential victim host

33
Q

the exploit of a hack

A

this is the specific hack method the attacker is using

34
Q

chain of attack computers

A

the attacker attacks through a chain of victim computers

35
Q

social engineering focuses on what kind of weakness?

A

human weakness

36
Q

Denial-of-Service (DoS) attack

A

make a server or entire network unavailable to its users and typically sends a flood of attack messages to the victim

37
Q

expert attackers create hacker _____ to automate some of their work

A

scripts

38
Q

Script ______ use scripts to make attacks

A

kiddies

39
Q

today most attackers are career criminals with

A

traditional criminal motives

40
Q

fraud

A

the attacker deceives the victim into doing something against the victim’s financial self-interst

41
Q

extortion

A

threaten a DoS attack or threaten to release stolen info unless the victim pays the attacker

42
Q

identity theft

A

stealing enough info to represent a victim in large transactions

43
Q

corporate identity theft

A

stealing the identity of an entire corporation

44
Q

commercial espionage

A

attacks on confidentiality and public info gathering

45
Q

DoS attacks by competitors

A

attacks of availability

46
Q

attacks by national govts are

A

cyberwar

47
Q

attacks by organized terrorists are

A

cyberterror

48
Q

cyberwar

A

computer-based attacks by national govts

49
Q

cyberterror

A

attacks by terrorists or terrorist groups that use the internet to attack IT resources directly