Chapter 4: People Authentication and Authorization Flashcards
Social Engineering
How hackers trick people into revealing access credentials or other valuable information.
Dumpster Diving
Looking through people’s trash to obtain information.
Pretexting
Form of social engineering in which one individual lies to obtain confidential data about another individual. Ex. CRA scam
Information Security Policies
Identifies the rules required to maintain information security.
Information Secrecy
Category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.
Phishing
A technique to gain personal information for the purpose of identity theft, usually by means of fraudulent email.
Pharming
Reroutes requests for legitimate websites to false websites.
Zombie
A program that secretly takes over another computer for the purpose of launching attacks.
Authentication
A method for confirming users’ identities.
Authorization
The process of providing a user with permission, including access levels and abilities.
Categories for authentication and authorization
1) Something the user knows, such as user ID and password.
2) Something the user has, such as a smart card or token.
3) Something that is part of the user, such as a fingerprint or voice signature.