Chapter 4 Network and Internet Security Flashcards

1
Q

what is unauthorized access?

A

Gaining access to a computer, network, file or other resource without permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is unauthorized use?

A

Using a computer resource for unapproved activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is hacking?

A

Using a computer to break into another computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are codes of conduct?

A

Codes that address prohibited activities such as playing games, installing personal software, violating copyright laws, causing harm to computers or the network and snooping in other peoples files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the Heartland Payment systems data breach

A

in 2009, the theft of consumer data such as theft of credit card numbers occurred from the epsilon mass email marketing company and more than 77 million sony playstation network accounts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the National electric sector cyber security organization?

A

An organization created by President Obama for cybersecurity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is war driving?

A

Driving around an area with a Wi-Fi enabled computer or mobile device to find a Wi-Fi network to access and use without authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Wi-Fi piggybacking

A

Accessing an unsecured Wi-Fi network from your current location without authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the Payment Card Industry Data Security Standard

A

PCI DSS
Requires companies to limit the credit card data stored on company servers and to encrypt the data that is allowed to be stored.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Access control Systems

A

used to control access to facilities, computer networks, company databases, web site accounts etc.
Egs are identification systems
and authentication systems
and identity management systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a possessed knowledge access system?

A

An access control system that uses information only the individual should know to identify that individual

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a password?

A

A secret combination of characters used to gain access to a computer, computer network or other resource.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is two-factor authentication systems

A

Using two different methods to authenticate a user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is possessed object access system?

A

An access control system that uses physical object and individual has in his or her possession to identify that individual.
Egs: RFID encoded badges, magnetic a cards or USB security keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a biometric access system?

A

An access control system that uses one unique physical characteristic of an individual such as a fingerprint face or voice to authenticate that individual

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is WEP and WPA and WPA2?

A

WEP: is Wired Equivalent privacy which is now considered insecure and has been replaced by
WPA: Wi-Fi protected access.
WPA2 is more protected than WPA.
Most Wi-Fi hardware today is shipped with the security features turned off and most people never enable them which leaves the networks unsecured

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Why should we use a network key or a passphrase when setting up a WiFi network?

A

To make sure the WiFi network is secured

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a SSID?

A

The name of the WiFi network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a firewall?

A

A collection of hardware and or software intended to protect a computer or computer network from unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

How does a firewall work?

A

It closes off all external communications port addresses which are the electronic connections that allow a computer to communicate with other computers to unauthorized computer programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is an intrusion prevention system?

A

A system related to a firewall which is used by businesses that instead of blocking unauthorized traffic it continuously monitors traffic to detect possible attacks as they are occurring then blocks them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are secure web pages?

A

Web pages that use encryption so that sensitive data such as credit card numbers are protected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are the most commonly used security protocols used with secure webpages?

A

SSL: Secure sockets layer
EV SSL: Extended Validation Secure Sockets Layer
Note: the URL’s will begging with https. rather than just http.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is self encrypting and where is it used?

A

Many computers and storage devices esp. those that are used for portable computers automatically encrypt all information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is private key encryption?

A

a type of encryption that uses a single key to encrypt and decrypt the file or message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is a public key encryption

A

A type of encryption that uses key pairs to encrypt and decrypt the file or message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What are a Virtual Private networks?

A

A private, secure path over the internet that provides authorized users a secure means of accessing a private network via the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What are some public hotspot precautions to take to protect your information?
Name approx. 10

A
  1. Turn off automatic connections and pay at ten to the list of available hotspots to make sure you connect to a legitimate spot.
  2. use a personal firewall to control the traffic going to and from your computer
  3. Use a virtual private network to secure all activity
  4. only enter passwords, credit card numbers, and other data on secure web pages using VPN
  5. if you’re not using a VPN, encrypt all sensitive files before transferring or emailing them.
  6. Avoid online shopping if you are not using a VPN
  7. Turn off file sharing so others can’t access the files on your hard drive
  8. Turn off blue tooth and Wi-Fi when you are not using them
  9. Disable ad hoc capabilities to prevent another computer from connecting to your computer without using and access point
  10. use antivirus software and make sure your operating system and browser are up to date
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is an evil twin?

A

is a fake Wi-Fi hotspot set up by a thief to masquerade as a legitimate Wi-Fi hotspot

30
Q

What is computer sabotage?

A

acts of malicious destruction to a computer or computer resource is another common crime today

31
Q

What is a Bot?

A

a computer that is controlled by a hacker or other computer criminal

32
Q

What is a Botnet?

A

A group of bots that are controlled by one individual

33
Q

What is Malware

A

Any type of malicious software

34
Q

What is a computer virus?

A

A software program installed without the users knowledge and designed to alter the way a computer operates or to cause harm to the computer

35
Q

What is a computer worm?

A

A malicious program designed to spread rapidly to a large number of computers by sending copies of itself to other computers

36
Q

What is a Trojan horse?

A

A malicious program that masquerades as something else.

37
Q

What is Mobile malware?

A

malware that affects mobile phones, portable digital media, printers and other devices.
Some are designed to crash that euphonies operating system and can be infected via bluetooth by just being in range

38
Q

What is Denial of Service Attack? (DoS Attack)

A

An act of sabotage that attempts to flood a network server or a Web server with so much activity that is unable to function.

39
Q

What is DDoS attacks?

A

Distributed denial of service attacks
This is where attacks are performed by botnets created by hackers and the computers in the bonnet participate in the attacks without the owners knowledge.

40
Q

What is security software?

A

software that is installed to protect the computer against a variety of threats

41
Q

What is antivirus software?

A

Software used to detect and eliminate computer viruses and other types of malware

42
Q

What are 8 virus prevention strategies?

A
  1. use antivirus
  2. Limit sharing of USB flash drives and other removable storage devices
  3. only download from reputable sites
  4. only open email attachments from people you know.
  5. for any downloaded file you are unsure of, upload it to a website such as VirusTotal.com that test files for viruses before you open them
  6. Keep email preview window closed
  7. regularly download latest security patches
  8. avoid downloading from P2P sites.
43
Q

What is a dot con?

A

a fraud or dcm carried out through the internet

44
Q

What is data theft or information theft?

A

is the theft of data or information located on or being sent from a computer
can be done by actually stealing the computer or it can take place over the internet by gaining unauthorized access to the computer

45
Q

What is salami shaving?

A

Money that is stolen via a computer. Company insiders steal money by altering company programs to transfer small amounts of money for example a few cents worth of bank account interest form a ver large number of transactions to an account controlled by thief.

46
Q

What is identity theft?

A

occurs when someone obtains enough information about a person to be able to masquerade as that person usually to buy products.

47
Q

What is skimming?

A

Skimming involves stealing credit cards or debit card numbers by using an illegal device attached to credit cardreader or an ATM mating that reads and stores the card numbers

48
Q

What is social engineering?

A

this involves pretending typically via a phone or email to be a bank officer, potential employer or other trusted individual in order to get the potential victim to supply personal information

49
Q

What is phishing?

A

the use of a spoofed email messages to gain credit card numbers and other personal data to be used for fraudulent purposes (e.g. mail that appears to have come from paypal or a bank etc)

50
Q

What is spear phishing?

A

a personalized phishing scheme targeted at and individual.

51
Q

What is pharming?

A

the use of spoofed domain names to obtain personal information in order to use that information in fraudulent activities

52
Q

What is online auction fraud?

A

When an item is “purchased” through and online auction is never delivered after payment or the item is not specified by the seller

53
Q

What are some characteristics of phishing emails? Name 7

A
  1. Tries to scare you into responding by sounding urgent including warnings that acct will be cancelled etc
  2. Asks you to provide personal info
  3. Contains links that do not go where they are supposed to go.
  4. Uses legit logos of companies
  5. Appears to come from a known organization
  6. Appears to be text and text and images but is actually a single image and has been created to avoid being caught in a spam filter
  7. Contains spelling or grammatical errors
54
Q

What are some tips for avoiding id theft? Name 9.

A
  1. Protect your SIN
  2. Be careful with mail…shred documents
  3. Keep security of computers upto date
  4. Be cautious never click on a link in an email message or respond to a too good to be true offer
  5. Use strong passwords
  6. Verify sources before sharing info. Never respond to phone or email requests for sensitive information
  7. Be vigilant while on the go…keep wallet, phone etc secure
  8. Watch bills and monitor credit cards… React immediately if you suspect fraud
  9. Use security software that warns you if you may be accessing a phishing site
55
Q

What is a digital certificate?

A

A group of electronic data that can be used to verify the id of a person or organization; includes a key pair that can be used for encryption and digital signatures

56
Q

What is a digital signature?

A

A unique digital code that can be attached to a file or an email to verify the identity of the sender and guarantee the file or message hasn’t been changed since it was signed

57
Q

What is cyberbullying?

A

Children or teenagers bullying other children or teens on the internet

58
Q

What is cyberstalking?

A

Repeated threats or harassing behaviour between adults carried out via email or another internet communication method

59
Q

What is the Identity Theft Penalty Enhancement Act?

A

Created in 2004.
Adds extra years to prison sentences for criminals who use ID theft to commit other crimes, including credit card fraud and terrorism

60
Q

What is the CAN-SPAM Act?

A

Created in 2003.

Implements regulations for unsolicited email messages

61
Q

What is the Fair and Accurate Credit Transactions Act (FACTA)?

A

Amends the fair credit reporting act (fcra) to require, among other things, that the three nationwide consumer reporting agencies (Equifax, Experian, and TransUnion) provides consumers, upon request a copy of their credit report once a year

62
Q

What is the Protect Act?

A

Includes provisions to prohibit virtual child pornography

63
Q

What is the Health Insurance Portability and Accountability Act (HIPAA)

A

Created in 2003

Includes a security rule that sets minimum security standards to protect health information stored electronically

64
Q

What is the Homeland Security Act?

A

Created in 2002.
Includes provisions to combat cyberterrorism include ins protecting ISPs against lawsuits from customers for revealing private information to law enforcement agencies

65
Q

What is the Serbanese-Oxley Act?

A

Created in 2002.

Requires archiving a variety of electronic records and protecting the integrity of corporate financial data

66
Q

What is the USA Patriot Act?

A

Created 2001

Grants federal authority expanded surveillance and gathering power.

67
Q

What is the Identity Theft and Assumption Deterrence Act of 1998?

A

Makes it a federal crime to knowingly use someone else’s Identity such as name , credit card numbers etc to commit a crime

68
Q

What is the No Electronic Theft (NET) Act?

A

Created in 1997.

Expands computer piracy laws to include distribution of copyrighted material over the internet.

69
Q

What is the National Information Infrastructure Protection Act?

A

Created in 1996
Amends the computer fraud and abuse act of 1984 to punish info theft crossing state lines and to crack down on network trespassing

70
Q

What is the Computer Fraud and Abuse Act of 1984

A

Makes it a crime to break into computers owned by the federal government. This act has been regularly amended over the years as technology has changed