Chapter 5 Flashcards

1
Q

What is information security and why do companies protect information resources?

A

a. Processes/policies made to protect an org data info system from unauthorized use
b. Companies protect because security breaches are expensive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

CIA frame work

A

Confidentially
i. System must prevent disclosing info to anyone not authorized to access it

Integrity
i. Accuracy of info resources within org

Availability

i. Computers and networks are working and the right people can get the info they need
ii. Should recover quick if system fails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Spyware Vs Adware

A

Spyware
i. software that secretly gathers info about users

adware
i. form of spyware that collects info to display ads

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Keystroke loggers

A

a. Monitors and records keystrokes

b. On hardware or software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Sniffing Vs Spoofing

A

Sniffing
a. Capturing and recording network traffic

Spoofing
a. attempt to gain access to network by posing as an authorized person to find

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Virus, Worms, and Trojan program

A

Virus
i. Attaches itself and is triggered by time or event(click)

Worms
i. Independent programs that spread themselves without having to be attached to a host program

Trojan programs
i. Hides in a popular program and contains code to disrupt computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Logic bomb

A

a. type of trojan program used to release a virus worm or other code
b. triggered by an event

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Backdoor

A

a. Built by designers that allows them to sneak into system later to access files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

RAM scraping

A

a. Scans ram to find sensitive data like credit card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Social engineering

A

a. Using people skills to trick others into revealing private info
b. Ex: using kids name aa password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Denial of Service attacks:

A

a. Floods server with requests to prevent user from accessing system
b. DDOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Fault-tolerant systems

A
a.	Using hardware and software to ensure availability in event of system failure
o Commonly used methods 
i.	Mirror disks
ii.	RAID
iii.	UPS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Access control

and the 3 types

A

a. Designed to protect systems from unauthorizes access

  1. Biometric
    - Ex: facial recognition
  2. Non-biometric
    - Password

3.Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Firewalls

and the 3 types

A

a. Combination of hardware and software that acts as a filter or barrier between a private network and external computers or networks

  1. Application firewall
    - controls use of applications such as email
  2. Packet-filtering firewall
    - examines every packet passing into and out of a network
  3. Proxy server
    - acts as an intermediary between two systems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly