Chapter 4 Network and Internet Security Flashcards
what is unauthorized access?
Gaining access to a computer, network, file or other resource without permission
What is unauthorized use?
Using a computer resource for unapproved activities
What is hacking?
Using a computer to break into another computer system
What are codes of conduct?
Codes that address prohibited activities such as playing games, installing personal software, violating copyright laws, causing harm to computers or the network and snooping in other peoples files.
What is the Heartland Payment systems data breach
in 2009, the theft of consumer data such as theft of credit card numbers occurred from the epsilon mass email marketing company and more than 77 million sony playstation network accounts.
What is the National electric sector cyber security organization?
An organization created by President Obama for cybersecurity
What is war driving?
Driving around an area with a Wi-Fi enabled computer or mobile device to find a Wi-Fi network to access and use without authorization
Wi-Fi piggybacking
Accessing an unsecured Wi-Fi network from your current location without authorization
What is the Payment Card Industry Data Security Standard
PCI DSS
Requires companies to limit the credit card data stored on company servers and to encrypt the data that is allowed to be stored.
Access control Systems
used to control access to facilities, computer networks, company databases, web site accounts etc.
Egs are identification systems
and authentication systems
and identity management systems
What is a possessed knowledge access system?
An access control system that uses information only the individual should know to identify that individual
What is a password?
A secret combination of characters used to gain access to a computer, computer network or other resource.
What is two-factor authentication systems
Using two different methods to authenticate a user
What is possessed object access system?
An access control system that uses physical object and individual has in his or her possession to identify that individual.
Egs: RFID encoded badges, magnetic a cards or USB security keys
What is a biometric access system?
An access control system that uses one unique physical characteristic of an individual such as a fingerprint face or voice to authenticate that individual
What is WEP and WPA and WPA2?
WEP: is Wired Equivalent privacy which is now considered insecure and has been replaced by
WPA: Wi-Fi protected access.
WPA2 is more protected than WPA.
Most Wi-Fi hardware today is shipped with the security features turned off and most people never enable them which leaves the networks unsecured
Why should we use a network key or a passphrase when setting up a WiFi network?
To make sure the WiFi network is secured
What is a SSID?
The name of the WiFi network.
What is a firewall?
A collection of hardware and or software intended to protect a computer or computer network from unauthorized access
How does a firewall work?
It closes off all external communications port addresses which are the electronic connections that allow a computer to communicate with other computers to unauthorized computer programs.
What is an intrusion prevention system?
A system related to a firewall which is used by businesses that instead of blocking unauthorized traffic it continuously monitors traffic to detect possible attacks as they are occurring then blocks them.
What are secure web pages?
Web pages that use encryption so that sensitive data such as credit card numbers are protected.
What are the most commonly used security protocols used with secure webpages?
SSL: Secure sockets layer
EV SSL: Extended Validation Secure Sockets Layer
Note: the URL’s will begging with https. rather than just http.
What is self encrypting and where is it used?
Many computers and storage devices esp. those that are used for portable computers automatically encrypt all information
What is private key encryption?
a type of encryption that uses a single key to encrypt and decrypt the file or message
What is a public key encryption
A type of encryption that uses key pairs to encrypt and decrypt the file or message
What are a Virtual Private networks?
A private, secure path over the internet that provides authorized users a secure means of accessing a private network via the internet.
What are some public hotspot precautions to take to protect your information?
Name approx. 10
- Turn off automatic connections and pay at ten to the list of available hotspots to make sure you connect to a legitimate spot.
- use a personal firewall to control the traffic going to and from your computer
- Use a virtual private network to secure all activity
- only enter passwords, credit card numbers, and other data on secure web pages using VPN
- if you’re not using a VPN, encrypt all sensitive files before transferring or emailing them.
- Avoid online shopping if you are not using a VPN
- Turn off file sharing so others can’t access the files on your hard drive
- Turn off blue tooth and Wi-Fi when you are not using them
- Disable ad hoc capabilities to prevent another computer from connecting to your computer without using and access point
- use antivirus software and make sure your operating system and browser are up to date