Chapter 2 Flashcards

1
Q

Organization Security

A

Without data, loses its record of transactions and /or ability to deliver value to customers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a threat?

A

An object, person, or other entity that represents a constant danger to an asset.
64% of organizations had malware infections
14% indicated system penetration by an outsider.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is information extortion? Describe how such an attack can cause loses?

A

Cyberextortion its an attack with a demand for money to stop the attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cracker? Phreaker?

A

Cracker - cracks or removes software protection designed to prevent unauthorized duplication.

Phreaker - hacks the public telephone network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Forces of Nature?

A

Disrupts storage, transmission, and use of information. Organizations must implement controls to limit damage and prepare contingency plans for continued operation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Human Error or Failure?

A

Inexperience
Improper training
Incorrect assumptions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What happens because of employee mistakes?

A

Revelation of classified data, entry of erroneous data, accidental deletion or modification of data, storage of data in unprotected areas.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Information Extortion?

A

Steals information and asks for money, for its return or nondisclosure.
Credit cards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Missing, Inadequate, or Incomplete

A

It can make organization vulnerable to loss, damage, or disclosure of information assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Sabotage or Vandalism

A

Cyberterrorism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Theft?

A

Illegal taking of another’s physical, electronic, or intellectual property.
Physical theft is controlled relatively easily.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Technical Hardware failures or error?

A

Distribution of flawed equipment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Software failures?

A

Hidden faults

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is an attack?

A

Acts that exploits vulnerability.

Done by threat agent that damages or steals organization’s information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Types of attacks?

A
Malicious code
Hoaxes
Back door
Password crack
Brute force
Dictionary
Denial of Service (DoS)
Distributed Denial of Service
(DDoS)
Spoofing
Man-in-the-middle.
Spam
Mail Bombing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is malicious code?

A

Malicious code: viruses, worms, horses, web scripts, with intent to destroy or steal information.

17
Q

What is hoaxes?

A

Hoaxes: transmission of a virus hoax with a real virus attached.

18
Q

What is back door?

A

Backdoor: gaining access to system.

19
Q

What password crack?

A

Password crack: attempting to reverse calculate a password.

20
Q

What is brute force?

A

Trying every possible combination of options of a password.

21
Q

What is dictionary?

A

Selects specific accounts to attack and uses commonly used passwords.

22
Q

What is DoS?

A

Denial of Service:

large number of information requests to a target.

23
Q

What is DDoS?

A

Distributed Denial of Service:

coordinated stream of requests is launched against target from many locations.

24
Q

What is spoofing?

A

Intruder assumes a trusted IP address.

25
Q

What is man-in-the-middle?

A

Attacker monitors packets, modifies them, and inserts them back into network.

26
Q

What is spam?

A

commercial e-mail.

27
Q

What is mail bombing?

A

DoS, large quantities of e-mail to target.

28
Q

Types of Attacks? (2)

A
Sniffers
Phishing
Pharming
Social Engineering
Timing attack.
29
Q

What are sniffers?

A

software that monitors data travelling over network.

30
Q

What is phishing?

A

A try to get personal information from an individual, posing as legitimate entity.

31
Q

What is pharming?

A

Redirection of legitimate web traffic to illegimate site.

32
Q

What is social engineering?

A

Using social skills to convince people to reveal access credentials or other valuable information to attacker.

33
Q

What is timing attack?

A

Exploring the contents of a web browser cache to create a malicious cookie.

34
Q

Why does polymorphism cause greater concern than traditional malware? How does it affect detection?

A

Polymorphic malware polymorphs, changes overtime, therefore it is harder to detect.