Chapter 5: Security Flashcards
1
Q
4 Costs of Cyber crime
A
- Stolen identities, intellectual property, trade secrets
- Damaged reputations
- Cost of upgrading security after an attack
- Opportunity costs associated with downtime, lost trust, loss of sensitive business information
2
Q
Spyware
A
- Software that secretly gathers information about users while they browse the web
- Install antivirus or anti spyware software
3
Q
Adware
A
- Type of spyware that collects information about the user to determine which advertisements to display in the user’s Web browser
- Install ad-blocking feature
4
Q
Phishing
A
- Sending fraudulent e-mails that seem to come from legitimate sources that direct recipients to false Web sites to capture private information
- Provides http address and attaches file
- User types in password
5
Q
Pharming
A
- Hijacking and altering the Internet Patrol (IP) address of an official Web site
- Users who enter the correct Web address are directed to the pharmer’s fraudulent Web site
- Similar to phishing, it directs internet users to fraudulent web sites with the intention of stealing their personal information, such as social security numbers, passwords, bank account numbers, and credit card numbers.
6
Q
Baiting
A
Similar to phishing (sending emails to fake websites) but the the baiter promises something to the recipient
7
Q
Quid pro quo
A
- Hacker requests the exchange of critical data or login information in exchange for a service or prize
- Requests exchange of data or login information for service or prize
8
Q
Keystroke Loggers
A
- Know everything that you are typing by reading key strokes
- Monitor and record keystrokes
- Can be software or hardware
- Prevented by antivirus and anti spyware programs
9
Q
Sniffing
A
Intercepts information by recording and capturing network traffic
10
Q
Spoofing
A
Poses as an authorized user to find information
11
Q
Computer fraud
A
Unauthorized use of computer data for personal gain
12
Q
CIA Triangle
A
- Confidentiality: Disclosing information from unauthorized users
- Integrity: Accuracy of information
- Availability: Authorized users can access information
13
Q
Virus
A
- Attaches itself to other programs or files, cycle continues
- Not independent
- Triggered by specific time or event
14
Q
Worm
A
- Take up space and makes computer unable to work properly
- Does not usually erase data
- Independent programs that spread themselves without having to be attacked to a host program
- Multiple, replicates, takes computer resources (space)
15
Q
Logic bombs
A
- Sits in system and waits to be activated
- Type of trojan program
- Releases virus, worm, or other destructive code
- If-then statement