Chapter 6 - CS3 - Info System Security Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Briefly define each of the three members of the information security triad.

A
  1. Confidentiality - only authorized users can access
  2. Integrity - information can be trusted, unaltered
  3. Availability - authorized users can access & modify info in an appropriate timeframe
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does the term authentication mean?

A

The process of ensuring that a person is who they claim to be

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is role-based access control? What is an access control list?

A
RBAC = assigning roles w/ preset permissions to users
ACL = assigning permissions to users
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is pretexting?

A

Pretexting occurs when an attacker calls a helpdesk or security administrator and pretends to be a particular authorized user having trouble logging in. Then, by providing some personal information about the authorized user, the attacker convinces the security person to reset the password and tell him what it is.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a firewall?

A

Hardware or software (or both) that filters packets as they enter based on set of rules; protects network’s resources from intrusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is multi-factor authentication?

A

Using more than one method of authentication - something you know, something you have, & something you are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are biometrics?

A

Using physical characteristics (eye-scan, fingerprint) to authenticate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the purpose of encryption? What are the two types of keys?

A

To keep transmitted data secret so that only those with a key can read it
Symmetric key - both parties share key, both can encode & decode
Public key - one party has public key (to encrypt); you need private key to decrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cyber-extortionist

A

Person who demands payment in order to prevent or stop attacks on an organization’s network, website or computer systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Script kiddies (skiddie)

A

An unskilled individual who uses scripts or programs developed by others to attack computer systems and networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Malware

A

Malicious software

Programs that act without a user’s knowledge and deliberately alter the operations of computers and mobile devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Computer virus

A

Program that attaches itself to a file, reproduces & spreads to other files
Key characteristic: will “lurk” for days or months quietly replicating itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Worm

A
Sub-class of virus 
Can spread w/o human help
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Trojan horse

A

NOT a virus, DO NOT replicate themselves

Destructive program, looks like genuine application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Botnet

A

Group of compromised computers connected to a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Back door

A

A program or set of instructions in a program that allow users to bypass security controls

17
Q

Spoofing

A

A technique intruders use to make their network or Internet transmission appear legitimate

18
Q

License Agreement

A

The right to use software

19
Q

Secure site

A

A website that uses encryption techniques to secure its data

20
Q

Cookie

A

A small text file that a web server stores on your computer (to recognize you & keep track of your preferences)

21
Q

Spyware

A

A program placed on a computer or mobile device without the user’s knowledge that secretly collects information about the user and then communicates the information it collects to some outside source while the user is online

22
Q

Adware

A

A program that displays an online advertisement in a banner or pop-up window