Chapter 5: Security Flashcards
4 Costs of Cyber crime
- Stolen identities, intellectual property, trade secrets
- Damaged reputations
- Cost of upgrading security after an attack
- Opportunity costs associated with downtime, lost trust, loss of sensitive business information
Spyware
- Software that secretly gathers information about users while they browse the web
- Install antivirus or anti spyware software
Adware
- Type of spyware that collects information about the user to determine which advertisements to display in the user’s Web browser
- Install ad-blocking feature
Phishing
- Sending fraudulent e-mails that seem to come from legitimate sources that direct recipients to false Web sites to capture private information
- Provides http address and attaches file
- User types in password
Pharming
- Hijacking and altering the Internet Patrol (IP) address of an official Web site
- Users who enter the correct Web address are directed to the pharmer’s fraudulent Web site
- Similar to phishing, it directs internet users to fraudulent web sites with the intention of stealing their personal information, such as social security numbers, passwords, bank account numbers, and credit card numbers.
Baiting
Similar to phishing (sending emails to fake websites) but the the baiter promises something to the recipient
Quid pro quo
- Hacker requests the exchange of critical data or login information in exchange for a service or prize
- Requests exchange of data or login information for service or prize
Keystroke Loggers
- Know everything that you are typing by reading key strokes
- Monitor and record keystrokes
- Can be software or hardware
- Prevented by antivirus and anti spyware programs
Sniffing
Intercepts information by recording and capturing network traffic
Spoofing
Poses as an authorized user to find information
Computer fraud
Unauthorized use of computer data for personal gain
CIA Triangle
- Confidentiality: Disclosing information from unauthorized users
- Integrity: Accuracy of information
- Availability: Authorized users can access information
Virus
- Attaches itself to other programs or files, cycle continues
- Not independent
- Triggered by specific time or event
Worm
- Take up space and makes computer unable to work properly
- Does not usually erase data
- Independent programs that spread themselves without having to be attacked to a host program
- Multiple, replicates, takes computer resources (space)
Logic bombs
- Sits in system and waits to be activated
- Type of trojan program
- Releases virus, worm, or other destructive code
- If-then statement
Trojan program
- Contain code intended to disrupt a computer, network, or Web site
- Hidden inside a popular program
Denial of service (DoS)
Flooding a network or server with service requests to prevent user from accessing the system
Mirror disks
Back up disk
Uninteruptable power supply (UPS)
Back up battery like generator
Fraud tolerant systems
Ensures availability in the event of a system failure by using a combination of hardware and software
Backdoor (trapdoor)
Allows the designer to bypass system security and sneak into the system later to access programs or files
Blended threat
Security threat that combines the characteristics of computer viruses, worms, and other malicious codes found on public and private networks.
Botnet
Type of internal threat (Denial of service DoS) attack that includes a network of computer and loT (internet of things: interrelated computing devices) devices infected with malicious software
Telephony denial of service (TDoS) attacks
Use high volumes of automated calls to tie up a target phone system, halting incoming and outgoing calls