chapter 6info system security CS3 Flashcards

1
Q

Internet and Network Attacks

Malware,

A

short for malicious software, consists of programs that act without a user’s knowledge and deliberately alter the operations of computers and mobile devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Internet and Network Attacks

firewall

A

is hardware and/or software that protects a network’s resources from intrusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Internet and Network Attacks

Spoofing

A

is a technique intruders use to make their network or Internet transmission appear legitimate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Internet and Network Attacks:

Back Door

A

is a program that allow users to bypass security controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Internet and Network Attacks

denial of service attack (DoS attack)

A

disrupts computer access to an Internet service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Internet and Network Attacks

TAntivirus

A

software is a set of utility programs that looks for and eradicates a wide spectrum of problems such as viruses, Trojan horses, and worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Internet and Network Attacks

Trojan horse

A

s not a virus. It is a destructive program that looks as a genuine application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Internet and Network Attacks

worm:

A

s similar to a virus by its design, and is considered to be a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any help from a person.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Internet and Network Attacks

WHAT DOES A VIRUS DO?

A

A virus can perform a trigger event: corrupt and/or destroy data display an irritating message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Internet and Network Attacks

computer virus:

A

s a program that attaches itself to a file, reproduces itself, and spreads to other files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Unauthorized Access and Use

A

A unauthorized access is the use of a computer or network without permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Access controls define

A

who can access a computer, device, or network; when they can access it; and what actions they can take while accessing it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

computer/device/network maintain an audit trail that records & File successful/unsuccessful access attempts OF WHAT?

A

USERN NAME

PASSWORD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Unauthorized Access and Use

biometric device?

A

authenticates a person’s identity by translating a BIO INFORMATION into a digital code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Unauthorized Access and Use:

Digital forensics?

A

evidence found on computers and networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Unauthorized Access and Use

possessed object?

A

is any item that you must possess, or carry with you, in order to gain access to a computer or computer facility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Unauthorized Access and Use

PIN?

A

personal identification number)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Unauthorized Access and Use

passphrase

A

is a private combination of words, often containing mixed capitalization and punctuation, associated with a user name that allows access to certain computer resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Information Theft:

secure site

A

A website that uses encryption techniques to secure its data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Information Theft - digital certificate

A

s a notice that guarantees a user or a website is legitimate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Information Theft - digital signature

A

is an encrypted code that a person, website, or organization attaches to an electronic message to verify the identity of the message sender

22
Q

Information Theft - Encryption

A

• the process of encoding a message, information, or data in such a way that only authorized parties can access it, prevents unauthorized access.

23
Q

Computer Ethics

code of conduct

A

is a written guideline that helps determine whether a specification is ethical/unethical or allowed/not allowed

24
Q

Ethics and Society

Green computing?

A

g involves reducing the electricity and environmental waste while using computers, mobile devices, and related technologies

25
Ethics and Society Digital rights management (DRM)?
is a strategy designed to prevent illegal distribution of movies, music, and other digital content
26
Ethics and Society copyright?
protects any tangible form of expression
27
Ethics and Society: Intellectual property RIGHTS of artist/works?
are the rights to which creators are entitled to their work
28
Ethics and Society: Intellectual property
unique and original ideas, inventions, art, writings, processes, company and product names, and logos
29
Information Privacy Web filtering:
software restricts access to specified websites/URL's
30
Information Privacy Content filtering:
is the process of restricting access to certain material/content
31
Information Privacy Adware:
is a program that displays an online advertisement in a banner or pop-up window on webpages, email messages, or other Internet service
32
Information Privacy Spyware:
is a program placed on a computer or mobile device without the user’s knowledge that secretly collects information about the user.
33
Information Privacy Websites use cookies for a variety of reasons:
Allow for personalization  Store user names and/or passwords  Assist with online shopping  Track how often users visit a site  Target advertisements
34
Information Privacy cookie
is a small text file that a web server stores on your computer
35
Data Backup & Restore EXPLAIN BACK UP PROCESS OF DATA
A backup is usually stored on a different storage medium from the original files The exact steps that you follow depend on your backup equipment, your backup software, and your personal backup plan
36
Data Backup & Restore restore
data from a backup to the original storage medium or its replacement
37
Data Backup & Restore backup
is a duplicate of a file, program, or media that can be used if the original is lost, damaged, or destroyed
38
CIA (CONFIDEVTIALITY INTEGRITY AVAILABILITY) Triad
Confidentiality, Integrity, and Availability is a model designed to guide policies for information security within an organization.
39
CIA Triad
Confidentiality, Integrity, and Availability is a model designed to guide policies for information security within an organizati
40
Confidentiality,
preserving authorized restrictions on access and disclosure, including a mean of protecting personal privacy and proprietary information;
41
Integrity:
, guarding against improper information modification or destruction, includes ensuring information accuracy and authenticity
42
Availability:
, ensuring timely and reliable access to and use of information.
43
digital security risk
is any event or action that could cause a loss of or damage to a computer or mobile device hardware, software, data, information, or processing capability
44
computer crime
Any illegal act involving the use of a computer
45
cybercrime
is an online or Internet-based illegal act
46
Hacker,
person who uses computers to gain unauthorized access to data.
47
Cracker,
name given to hackers who break into computers for criminal gain.
48
Digital Security Risks ;Unethical employees
employees’ actions that don’t conform to the acceptable standards of business operations, failing to do what is right in every situation.
49
Digital Security Risks Script kiddies
is an unskilled individual who uses scripts or programs developed by others to attack computer systems and networks.
50
Digital Security Risks Cyberextortionist,
person who demands payment in order to prevent or stop attacks on an organization’s network, website or computer systems.
51
Digital Security Risks Cyberextortionist,
person who demands payment in order to prevent or stop attacks on an organization’s network, website or computer systems.