Chapter 12 - Security Flashcards

0
Q

Vulnerability

A

An opportunity for threats to gain access to individual or organizational assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

Threat

A

Person or organization that seeks to obtain or alter data or other assets illegally, without the owner’s permission and often without the owner’s knowledge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Safeguard

A

Some measure that individuals or organizations take to block the threat from obtaining the asset.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Target

A

The asset that is desired by the threat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Three Sources of Threats

A
  • Human Error
  • Computer Crime
  • Natural Disasters
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Five Types of Security Loss

A
  • Unauthorized Data Disclosure
  • Incorrect Data Modification
  • Faulty Service
  • Denial of Service
  • Loss of Infrastructure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Usurpation

A

Computer criminals invade a computer and replace legitimate programs with their own, unauthorized ones.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Advanced Persistent Threat (APT)

A

Sophisticated, possibly long-running, computer hack that is perpetrated by large, well-funded organizations such as governments. A means to engage in cyber warfare. Examples are Stuxnet and Flame.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Intrusion Detection System (IDS)

A

A computer program that senses when another computer is attempting to scan the disk or otherwise access a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Gramm-Leach-Bliley Act

A

Protects consumer financial data stored by financial institutions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Privacy Act of 1974

A

Protects records of individuals held by the U.S. Government.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

HIPAA

A

Health Insurance Portability and Accountability Act. Gives individuals the right to access health data and sets rules and limits on who can read and receive your health information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Identification

A

User name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Authentication

A

Password, smart card with pin, biometric authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Biometric Authentication

A

Uses personal physical characteristics such as fingerprints, facial features, and retinal scans to authenticate users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Encryption

A

The process of transforming clear text into coded, unintelligible text for secure storage and communication.

16
Q

Symmetric Encryption

A

The same key is used to encode and decode.

17
Q

Asymmetric Encryption

A

Two keys are used; one key encodes and the other key decodes. This is used in the public key/private key method used on the internet.

18
Q

Firewall

A

Device or program that prevents unauthorized network access. A perimeter firewall sits outside the organizational network. An internal firewall is inside the internal network.

19
Q

Malware

A

Viruses, worms, Trojan horses, spyware and adware.

20
Q

Virus

A

A computer program that replicates itself.

21
Q

Payload

A

The program code that causes unwanted or harmful activity.

22
Q

Trojan Horses

A

Viruses that masquerade as useful programs.

23
Q

Worm

A

A virus that propagates using the Internet or other computer network.

24
Q

Spyware and Adware

A

Programs installed on the user’s computer without the users knowledge or permission. Adware watches user activity and produces pop-up ads.

25
Q

Malware Definitions

A

Patterns that exist in the malware code.

26
Q

SQL Injection Attack

A

In a poorly designed app an attacker might write SQL code in a text entry box that then gets executed by the database. This can cause improper data disclosure or data damage.

27
Q

Key Escrow

A

A trusted party holds a copy of an encryption key, in case the original is lost or damaged.

28
Q

Hardening

A

Hardened sites use special version of the operating system, and they lock down or eliminate operating system features and functions that are not required by the application.