Chapter 11 Flashcards

1
Q

What is a traffic anomaly detector?

A

A special-purpose security device that is installed in the front of the main router.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a virus?

A

Malware designed to spread from host to host and has the ability to replicate itself. They cannot reproduce and spread without programming such as a file or document.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a worm?

A

A self-replicating computer program that penetrates an operating system with the intent of spreading malicious code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a DoS?

A

A Denial of Service is a cyber-attack where the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a DDoS?

A

A Distributed Denial of Service is when multiple compromised systems, which are often infected with a Trojan, are used to target a single system causing a Denial of Service (DoS) attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is firewall?

A

A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is spoofing?

A

A technique used to gain unauthorized access to computers, whereby the intruder sends messages to a computer with an IP address indicating that the message is coming from a trusted host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is sniffer?

A

Software or hardware that can intercept and log traffic passing over a digital network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Trojan Horse?

A

Any malicious computer program which misleads users of its true intent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is spyware?

A

A type of malware that is installed on a computer without the knowledge of the owner in order to collect the owner’s private information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is PKI?

A

Public Key Infrastructure Supports the distribution and identification of public encryption keys, enabling users and computers to both securely exchange data over networks such as the Internet and verify the identity of the other party.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is SSL?

A

Secure Sockets Layer is a protocol developed by Netscape for transmitting private documents via the Internet. Uses a cryptographic system that uses two keys to encrypt data − a public key known to everyone and a private or secret key known only to the recipient of the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is PGP?

A

Pretty Good Privacy is a popular program used to encrypt and decrypt email over the Internet, as well as authenticate messages with digital signatures and encrypted stored files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is IPSec?

A

Internet Protocol Security is a framework of open standards for helping to ensure private, secure communications over Internet Protocol (IP) networks through the use of cryptographic security services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is phishing?

A

A term used to describe a malicious individual or group of individuals who scam users. They do so by sending e-mails or creating web pages that are designed to collect an individual’s online bank, credit card, or other login information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Triple DES?

A

Triple Data Encryption Standard is a type of computerized cryptography where block cipher algorithms are applied three times to each data block.

17
Q

What is digital signature?

A

A mathematical technique used to validate the authenticity and integrity of a message, software or digital document.

18
Q

What is certificate authority?

A

A trusted entity that issues electronic documents that verify a digital entity’s identity on the Internet.

19
Q

How can unauthorized access be prevented?

A

Ensuring confidentiality and integrity. Intrusion is done by either external hackers or disgruntled employees. Intrusion can be minor where attacker only looks around or major where attacker may commit industrial espionage.

20
Q

What is business continuity?

A

Ensuring availability and integrity. Disruptions are loss or reduction in network service. Viruses, hard disk crashes, and natural or human-made disasters can destroy data. Disruptions can be minor or major.

21
Q

What is a SQL injection?

A

A program which does not affect user directly, but attacks website to gain unauthorized access to database allowing attacker to retrieve valuable information.

22
Q

How is a risk assessment conducted?

A

Frameworks provide strategies for analyzing and prioritizing security risks to information systems and networks. Should be simple so both technical and nontechnical readers can understand it. After reading assessment anyone should know which components are at risk and which controls have been implemented.

23
Q

What are the steps of a risk assessment.

A

Develop measurement criteria, inventory assets, identify threats, document controls, identify improvements.

24
Q

what is anti-virus software?

A

Software used to prevent, detect and remove malware.

25
Q

What is traffic filtering and limiting?

A

Verifies source address of incoming messages is valid. Limits the number of incoming packets that are allowed into the network.