Chapter 5 Flashcards

1
Q

software to detect and remove viruses and other malware

A

anti-virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

another term for public key encryption

A

asymmetric key encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

establishing a user’s identity

A

authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

method of by-passing security in a system, built in by the system designers

A

backdoor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

process of registering a user for a biometric system by taking an initial sample

A

biometric enrolment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

measurements taken from a biometric sample

A

biometric template

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

use of fingerprints, retina scans, or other body features as an authentication mechanism

A

biometrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

group of zombie computers under the control of a criminal

A

botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

attempt to break a password by trying all possible combinations of letters, numbers, and symbols

A

brute force attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

system designed to create text that is unreadable to a computer but understandable to a person, to reduce spam

A

CAPTCHA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

organization that issues digital certificates to individuals and companies

A

Certificate Authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

result of encrypting plaintext

A

ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

UK law governing criminal offenses committed using a computer

A

Computer Misuse Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

another word for hacking

A

cracking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

flooding a computer system with data so that it cannot respond to genuine users

A

Denial of Service Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

attempt to break a password by trying all possible words

A

dictionary attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

technique used to authenticate remote users, such as online shopping businesses

A

digital signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

denial of service attack committed using dozens of computers, usually zombies on a botnet

A

Distributed Denial of Service attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

technique used by criminals to alter domain name system (DNS) records and drive users from faking sites to committing phishing

A

DNS poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

program which automatically downloads when a user visits a webpage, usually without their knowledge or consent

A

drive-by download

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

system of encoding plaintext so that it cannot be understood with access to an encryption key

A

encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

used to encrypt and decrypt data

A

encryption key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Extended Validation SSL; digital certificate validation technique used on the world wide web

A

EV SSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

when a system incorrectly rejects an action instead of accepting it

A

false negative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

when a system incorrectly accepts an action instead of rejecting it

A

false positive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

system that encrypts all data saved to a hard disk automatically and transparently

A

full disk encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

gaining illegal access to a computer system

A

hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

directory that contains a users personal files

A

home directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

secure version of HyperText Transfer Protocol (HTTP) which offers encrypted communication

A

HTTPS

30
Q

stealing personal data in order to impersonate a person

A

identity theft

31
Q

idea of having encryption keys stored by a third party company so the government can access them if needed

A

key escrow

32
Q

software or hardware which records all key strokes on a computer system

A

key logger

33
Q

a public key and private key that work together in a public encryption system

A

key pair

34
Q

virus that takes advantage of the macro programming languages built into some software

A

macro virus

35
Q

generic name for malicious software

A

malware

36
Q

use of several authentication techniques together, such as passwords and security tokens

A

multi-factor authentication

37
Q

password generated by a security token, which expires as soon as it is used

A

one time password

38
Q

software or hardware used to collect data traveling over a network

A

packet sniffer

39
Q

another word for password

A

passphrase

40
Q

word or phrase used to authenticate a user

A

password

41
Q

another word for DNS poisoning

A

pharming

42
Q

use of fake emails and web sites to trick users into revealing sensitive data

A

phishing

43
Q

locks, alarms, and other techniques used to secure a building or computer room

A

physical security

44
Q

message before it is encrypted, or after it has been decrypted

A

plaintext

45
Q

key used for decryption in a public key encryption system

A

private key

46
Q

key used for encryption in a public key encryption system

A

public key

47
Q

user with full control over a computer system

A

root user

48
Q

type of malware which infiltrates the operating system and attempts to hide itself from view

A

rootkit

49
Q

encryption system in which a single key is used for both encryption and decryption

A

secret key encryption

50
Q

system used to encrypt https web traffic

A

Secure Socket Layer / Transport Layer Security

51
Q

hardware device that must be present during login to authenticate a user

A

security token

52
Q

software update to fix a security problem discovered in software

A

security update

53
Q

phishing attacks committed using text messages (SMS)

A

smishing

54
Q

tricking a user into revealing their password or other sensitive data

A

social engineering

55
Q

unwanted, bulk email

A

spam

56
Q

program that scans web pages for email address, in order to send spam

A

spam bot

57
Q

program designed to identify and block spam messages while letting genuine messages through

A

spam filters

58
Q

malware which covertly records a user’s actions, such as their key presses

A

spyware

59
Q

another word for secret key encryption

A

symmetric key encryption

60
Q

person in overall charge of a computer system in an organization

A

system administrator

61
Q

malware which pretends to be a genuinely useful program to trick the user into using it

A

Trojan horse

62
Q

gaining illegal access to a computer system

A

unauthorized access

63
Q

computer program which damages files and data spreads when infected programs are copied

A

virus

64
Q

used by anti-virus programs to recognize known viruses

A

virus definition file

65
Q

phishing attacks committed using telephone calls or VoIP systems

A

vishing

66
Q

software to scan a system for potential security problems

A

vulnerability scanner

67
Q

technique used by spammers to detect if an email address is valid or not

A

web bug

68
Q

Wired Equivalence Protocol; wireless network encryption system

A

WEP

69
Q

malicious software which replicates itself and spreads between computer systems and over networds

A

worm

70
Q

Wireless Protected Access; wireless network encryption system

A

WPA

71
Q

Wireless Protected Access 2; wireless network encryption system

A

WPA2

72
Q

computer which has been compromised by malware and is part of a botnet

A

zombie