Chapter 12 In Class Notes Flashcards

1
Q

A person or organization that seeks to obtain
data or other assets illegally, without the
owner’s permission and often without the
owner’s knowledge

A

Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An opportunity for threats to gain access to

individual or organizational assets.

A

vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A measure that individuals or organizations
take to block the threat from obtaining an
asset.

A

Safeguards. Safeguards are not always effective.
Some threats achieve their goal in spite of
safeguards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An asset that is desired by the threat.

A

Target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SOURCES OF THREATS? 3 of them

A

HUMAN ERROR
COMPUTER CRIME
 NATURAL EVENTS AND
DISASTERS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

 Accidental problems caused by both

employees and nonemployees.

A

 Procedures not followed
 Increasing a customer’s discount
 Incorrectly modifying employee’s salary
 Placing incorrect data on company Web site
 System errors
 Systems working incorrectly
 Programming errors
7
g g
 IT installation errors
 Faulty recovery actions after a disaster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

 Includes employees and former employees who
intentionally destroy data or other system
components.

A

Computer Crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A technique for gathering unauthorized
information in which someone pretends to be
someone else.

A

Pretexting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When someone pretends to be
someone else with the intent of obtaining
unauthorized data.

A

Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A type of spoofing whereby an
intruder uses another site’s IP address as if it were
that other site.

A

IP Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is needed for your reset password information?

A

 Victim’s Email Address

 Answer to victim’s security question!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A technique for intercepting computer

communications.

A

Sniffing. With wired networks, sniffing
requires a physical connection to the network.
With wireless networks, no such connection is
required.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

People who take computers
with wireless connections through an area an
search for unprotected wireless networks in an
attempt to gain free Internet access or to gather
16 unauthorized data.

A

Drive by sniffer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A form of computer crime in which a person gains

unauthorized access to a computer system.

A

Hacking. Although
some people hack for the sheer joy of doing it, other
hackers invade systems for the malicious purpose of
stealing or modifying data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Occurs when unauthorized programs invade a
computer system and replace legitimate programs.
Such unauthorized programs typically shut down
the legitimate system and substitute their own
processing.

A

Usurpation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A computer program that senses when another
computer is attempting to scan the disk or
otherwise access a computer.

A

Intrusion Detection System (IDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Management’s policy for computer security,
consisting of a general statement of the
organization’s security program, issue-specific
policy, and system-specific policy.

A

Security Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What Are the Elements of a

Security Policy? 3 of them

A
  1. General statement of organizations security program
  2. Issue-specific policy
  3. System-specific policy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

threats & consequences we know about

A

risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

things we do not know that we do not know

A

Uncertainty

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
The “bottom line”
of risk assessment; the likelihood
of loss multiplied by the cost of the
loss consequences (both tangible
and intangible).
A

Probable loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

• Given probable loss, what to protect?
• Which safeguards inexpensive and easy?
• Which vulnerabilities expensive to eliminate?
• How to balance cost of safeguards with benefits of
probable loss reduction?
You should ask these questions when making what kind of decision?

A

Risk-Management Decisions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Protects consumer financial data stored by
financial institutions (banks, securities firms,
insurance companies, and organizations) that
provide financial advice, prepare tax returns, and
provide similar financial services.

A

Gramm-Leach-Bliley (GLB) Act (1999) -

24
Q

ederal law that provides
protections to individuals regarding records
31 maintained by the U.S. government

A

Privacy Act of 1974

25
Q

Give
individuals the right to access health data created
by doctors and other health-care providers.
HIPAA also sets rules and limits on who can
read and receive a person’s health information.

A
Health Insurance Portability and
Accountability Act (HIPAA) (1996)
26
Q

A wireless
security standard developed by the IEEE 802.11
committee that was insufficiently tested before it
was deployed in the communications equipment.
IT has serious flaws.

A

WEP (Wired-Equivalent Privacy)

27
Q

An
improved wireless security standard developed
by the IEEE 802.11 committee to fix the flaws
34 of the Wired Equivalent Privacy (WEP) standard

A

WPA & WPA2 (WiFI Protected Access)

28
Q

What Technical Safeguards

Are Available?

A
  1. Identification and authentication
  2. Encryption
  3. Firewalls
  4. Malware protection
  5. Design for secure applications
29
Q

The process whereby an information
system identifies a user by requiring the user to sign on
with a username and password.

A

Identification

30
Q
The process whereby and information
system verifies (validates) a user.
A

Authentication

31
Q

A form of
authentication whereby the user supplies a number that
only he or she knows.

A

Personal Identification Number (PIN)

32
Q

The use of personal physical
characteristics, such as fingerprints, facial features, and
36 retinal scans, to authenticate users.

A

Biometric authentication

33
Q

A system, developed at MIT that authenticates
users without sending their passwords across a
computer network. It uses a complicated system
of “tickets” to enable users to obtain services
from networks and other servers.

A

Kerberos

34
Q

The process of transforming clear text into
coded, unintelligible text for secure storage or
communication.

A

Encryption

35
Q

Algorithms used to transform
clear text into coded, unintelligible text for secure storage or
communication. Commonly used methods are DES, 3DES,
and AES.

A

Encryption algorithms

36
Q

A number used to encrypt data. The encryption
algorithm applies the key to the original message to produce
the coded message. Decoding (decrypting) the message is
similar; a key is applied to the coded message to recover the
original text.

A

Key

37
Q

An encryption method whereby

the same key is used to encode and to decode the message.

A

Symmetric Encryption

38
Q

An encryption method
whereby different keys are used to encode and to
decode the message; one key encodes the message,
and the other key decodes the message.

A

Asymmetric encryption

39
Q

A special version of
asymmetric encryption that is popular on the Internet.
With this method, each side has a public key for
encoding messages and a private key for decoding
42 them.

A

Public Key/Private Key

40
Q

used for full disk encryption
– All hard drives contents are encrypted
• If stolen, nothing can be recovered!

A

Truecrypt

41
Q

used for single file encryption
– Make .exe file to send to others
• Taxes, SSN, PHI, etc

A

Axcrypt

42
Q

A computer program that replicates itself.

A

Virus

43
Q

The program codes of a virus that causes
unwanted or hurtful actions, such as deleting programs
or data, or even worse, modifying data in ways that are
undetected by the user.

A

Payload

44
Q

Virus that masquerades as a useful

program or file.

A

Trojan horses. A typical Trojan horse appears to be a
computer game, an MP3 music file, or some other
useful, innocuous program.

45
Q

A virus that propagates itself using the

Internet or some other computer network.

A

Worms. Worm code
is written specifically to infect another computer as
quickly as possible.

46
Q

Tiny files that gather demographic

information

A

Beacon. Beacons are often image files that install
malware code when users open images in junk mail.
Most are not malicious and simply verify users’ email
addresses, activities, and preferences.

47
Q

captures keystrokes to obtain user
names, passwords, account numbers, and other
sensitive information.

A

Spyware. Other spyware is used for
marketing analysis observing what users do, Web
sites visited, products examined and purchased,
and so forth.

48
Q

most is benign in that it does not
perform malicious acts or steal data. It does,
however, watch user activities and produce pop50
up ads.

A

Adware

49
Q

Security problem in which users are not able to
access an information system; can be caused by
human errors, natural disasters, or malicious
activity.

A

Denial of Service (DOS)

50
Q

A term used to describe server operating
systems that have been modified to make them
especially difficult for them to be infiltrated by
malware

A

Hardening

51
Q

A password-cracking
program that tries every possible combination
of characters.

A

Brute Force Attack

52
Q

False targets for computer criminals to attack

A

Honeypots

53
Q

A utility company that can take over
another company’s processing with no
forewarning.

A

Hot Site. Hot sites are expensive;
organizations pay $250,000 or more per month
for such services.

54
Q

Remote processing centers that
provide office space, and possibly computer
equipment, for use by a company to use to
continue operations after a disaster.

A

Cold Sites

55
Q

2022?

A

• Challenges likely to be iOS and other intelligent
portable devices
• Harder for the lone hacker to find vulnerability to
exploit
• Continued investment in safeguards
• Continued problem of electronically porous
national borders