Chapter 19 Flashcards

1
Q

A term that, depending on the context, may be applied to either (1) someone who breaks into computer systems, or (2) a particularly clever programmer.

A

Hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Someone who uncovers computer weaknesses without exploiting them. The goal of the white hat hacker is to improve system security.

A

white hat hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Computer criminals.

A

black hat hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Hordes of surreptitiously infiltrated computers, linked and controlled remotely, also known as zombie networks.

A

botnets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An attack where a firm’s computer systems are flooded with thousands of seemingly legitimate requests, the sheer volume of which will slow or shut down the site’s use. DDoS attacks are often performed via botnets.

A

distributed denial of service (DDoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A protester seeking to make a political point by leveraging technology tools, often through system infiltration, defacement, or damage.

A

hacktivists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A term that may, depending on the context, refer to either (1) breaking into a computer system, or (2) a particularly clever solution.

A

hack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Criminals who purchase assets from data harvesters to be used for illegal financial gain. Actions may include using stolen credit card numbers to purchase goods, creating fake accounts via identity fraud, and more.

A

cash-out fraudsters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cybercriminals who infiltrate systems and collect data for illegal resale.

A

data harvesters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Code that unlocks encryption.

A

key (encryption)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

When identity is proven by presenting more than one item for proof of credentials. Multiple factors often include a password and some other identifier such as a unique code sent via e-mail or mobile phone text, a biometric reading (e.g., fingerprint or iris scan), a swipe or tap card, or other form of identification.

A

multi-factor authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A con executed using technology, typically targeted at acquiring sensitive information or tricking someone into installing malicious software.

A

phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Scrambling data using a code or formula, known as a cipher, such that it is hidden from those who do not have the unlocking key.

A

encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Term used in security to refer to forging or disguising the origin or identity. E-mail transmissions and packets that have been altered to seem as if they came from another source are referred to as being “spoofed.”

A

spoofed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Attacks that are so new that they haven’t been clearly identified, and so they haven’t made it into security screening systems.

A

zero-day exploits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A two-key system used for securing electronic transmissions. One key distributed publicly is used to encrypt (lock) data, but it cannot unlock data. Unlocking can only be performed with the private key. The private key also cannot be reverse engineered from the public key. By distributing public keys, but keeping the private key, Internet services can ensure transmissions to their site are secure.

A

public key encryption

17
Q

Combing through trash to identify valuable assets.

A

dumpster diving

18
Q

Technology that identifies users via unique characteristics in speech.

A

voice-print

19
Q

A trusted third party that provides authentication services in public key encryption schemes.

A

certificate authority

20
Q

An acronym standing for completely automated public Turing test to tell computers and humans apart. The Turing test is, rather redundantly, an idea (rather than an official test) that one can create a test to tell computers apart from humans.

A

CAPTCHAs

21
Q

An attack that exhausts all possible password combinations in order to break into an account. The larger and more complicated a password or key, the longer a brute-force attack will take.

A

brute-force attacks

22
Q

Technologies that measure and analyze human body characteristics for identification or authentication. These might include fingerprint readers, retina scanners, voice and face recognition, and more.

A

biometrics

23
Q

Gaining compromising information through observation (as in looking over someone’s shoulder).

A

shoulder surfing

24
Q

Highly restrictive programs that permit communication only with approved entities and/or in an approved manner.

A

whitelists

25
Q

A system that acts as a control for network traffic, blocking unauthorized traffic while permitting acceptable use.

A

firewalls

26
Q

A system that monitors network use for potential hacking attempts. Such a system may take preventative action to block, isolate, or identify attempted infiltration, and raise further alarms to warn security personnel.

A

intrusion detection systems

27
Q

A seemingly tempting, but bogus target meant to draw hacking attempts. By monitoring infiltration attempts against a honeypot, organizations may gain insight into the identity of hackers and their techniques, and they can share this with partners and law enforcement.

A

honeypots

28
Q

Programs that deny the entry or exit of specific IP addresses, products, Internet domains, and other communication restrictions.

A

blacklists