Chapter 8 Flashcards
) attack uses numerous computers to inundate
and overwhelm the network from numerous launch points.
DDOS attack
redirects users to a bogus Web page, even when the individual
types the correct Web page address into his or her browser.
Pharming
uses systems that read and interpret individual
human traits, such as fingerprints, irises, and voices, in order to grant or deny
access.
Biometric Authentication
the sender and
receiver establish a secure Internet session by creating a single encryption key
and sending it to the receiver so both the sender and receiver share the same
key
Symmetric Encryption
is a rogue software program that attaches itself to other software
programs or data files in order to be executed, usually without user knowledge
or permission
computer
virus
refers to the policies, procedure, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems.
Security
focuses on how the company can restore business operations after a disaster strikes.
plan identifies
critical business processes and determines action plans for handling mission-critical functions if systems go down.
Business Continuity Planning
also may involve redirecting a Web link to an address different from the
intended one, with the site masquerading as the intended destinati
Spoofing
t determines the level of risk to the firm if a specific activity or process is not properly controlled. Not all risks can be anticipated and
measured, but most businesses will be able to acquire some understanding of
the risks they face.
Risk Assessment
is a physical
device, similar to an identification card, that is designed to prove the identity
of a single user.
Token
are data files used to establish the identity of users and electronic assets for protection of online transactions
Digital Certificate
refers to the ability to know that a person is who he or she claims to be.
Authentication
The initial security standard developed for Wi-Fi
Wired equivalent privacy
check data for accuracy and completeness when they enter
the system. There are specific input controls for input authorization, data
conversion, data editing, and error handling
Input controls
contain redundant hardware, software,
and power supply components that create an environment that provides
continuous, uninterrupted service.
use special software routines or self-checking logic built into their circuitry to detect hardware
failures and automatically switch to a backup device.
Fault tolerant computer system
- are the largest malware threat
- take advantage of vulnerabilities in poorly coded Web application software to introduce malicious program code into a company’s systems
and networks.
SQL Injection Attack
enable client and server computers to manage encryption and decryption
activities as they communicate with each other during a secure Web session
Secure Sockets Layer (SSL) and its successor Transport Layer Security (TLS)
outlines medical security and privacy rules and procedures for
simplifying the administration of health care billing and automating the
transfer of health care data between health care providers, payers, and plans
Health Isurance portability and accountability act of 1996
examines the firm’s overall security
environment as well as controls governing individual information systems.
MIS Audit
in which eavesdroppers drive by buildings or park outside and try to intercept
wireless network traffic.
War Driving
govern the
design, security, and use of computer programs and the security of data files in
general throughout the organization’s information technology infrastructure.
General Control
To correct software flaws once they are identified, the software vendor
creates small pieces of software
Patch
the intentional disruption, defacement, or even destruction of a Web site or
corporate information system
Cybervandalism
When errors are discovered, the source is found
and eliminated through a process
Debugging
Types of General control
- Hardware Control
- Software Control
- Computer operation Control
- Data security control
- Implementation control
- Administrative control
helps firms recover quickly from a
system crash, whereas fault tolerance promises continuous availability and the
elimination of recovery time altogether.
High Availability computing
, hackers flood a network server or Web
server with many thousands of false communications or requests for services to
crash the network
DOS attack
are methods, policies, and organizational
procedures that ensure the safety of the organization’s assets; the accuracy and
reliability of its records; and operational adherence to management standards.
Controls
provides additional security by determining whether
packets are part of an ongoing dialogue between a sender and a receiver. It sets
up state tables to track information over multiple packets
Stateful Inspection
examines data files and sorts out low-priority online material
while assigning higher priority to business-critical files.
Deep packet inspection
gain unauthorized access by finding weaknesses in the security protections employed by
Web sites and computer systems, often taking advantage of various features of
the Internet that make it an open system that is easy to use.
Hacker and cracker
are wireless networks that pretend to offer trustworthy Wi-Fi
connections to the Internet, such as those in airport lounges, hotels, or coffee
shops.
Evil Twins
is a crime in which an imposter
obtains key pieces of personal information, such as social security identification
numbers, driver’s license numbers, or credit card numbers, to impersonate
someone else
Identity Theft
) can provide another layer of protection
when static packet filtering and stateful inspection are employed
Network Address Translation
It imposes
responsibility on companies and their management to safeguard the accuracy and integrity of financial information that is used internally and
released externally
y is fundamentally about ensuring that internal controls are in
place to govern the creation and documentation of information in financial statements
Sarbanes oxley act or Public company accounting reform and investor protection act of 2002
examines the application content of packets.
Application proxy filtering
feature
full-time monitoring tools placed at the most vulnerable points or “hot spots” of
corporate networks to detect and deter intruders continually
Intrusion detection Systems
establish that
data are complete and accurate during updating.
Processing controls
to make virus distribution and hacker attacks that disable Web sites federal crimes.
National information infrastructure protection act in 1996
looks for patterns indicative of known methods of computer attacks, such as
bad passwords, checks to see if important files have been removed or modified,
and sends warnings of vandalism or system administration errors.
Scanning software`
Types of Authentication Technology
Token, Smart Card, and Biometric Authentication
A more secured form of encryption is called
Public key encryption
consists of statements ranking information risks, identifying acceptable
security goals, and identifying the mechanisms for achieving these goals.
Security Policy
ensure that the results of computer processing are accurate, complete, and properly
distributed.
Output Controls
is a software program that appears to be benign but then
does something other than expected
Trojan Horse
is an individual who intends to gain unauthorized access to a computer system.
Hacker
consists of business processes and software tools for identifying
the valid users of a system and controlling their access to system resources
Identity Management
is a type of eavesdropping program that monitors information
traveling over a network.
Sniffer
is designed to
check computer systems and drives for the presence of computer viruses.
Antivirus software
These small programs
install themselves surreptitiously on computers to monitor user Web surfing
activity and serve up advertising.
Spyware
is another protocol used for
encrypting data flowing over the Internet, but it is limited to individual
messages
Secure Hypertext transfer Protocol
Are referred to as malware and include variety of threats, such as computer viruses, worms, and trojan hoarses
malicious software
which are independent
computer programs that copy themselves from one computer to other computers over a network.
Worms
It is up to users of the
software to track these vulnerabilities, test, and apply all patches
Patch Management
is typically used
to denote a hacker with criminal intent, although in the public press, the terms
hacker and cracker are used interchangeably
Cracker
infecting other people’s computers
with bot malware that opens a back door through which an attacker can give
instructions.
Botnet
examines events as they are happening to discover security attacks in
progress.
Monitoring software
are often spread over the Internet from files of downloaded software, from files attached to e-mail transmissions, or from
compromised e-mail messages or instant messaging
Worms and Viruses
This act
requires financial institutions to ensure the security and confidentiality of
customer data. Data must be stored on a secure medium, and special security
measures must be enforced to protect such data on storage media and during
transmittal.
Financial service modernization act of 1999 or Gramm-Leach-blibey act
any violations of criminal law
that involve a knowledge of computer technology for their perpetration, investigation, or prosecution.”
Computer Crime
n is the process of
transforming plain text or data into cipher text that cannot be read by anyone
other than the sender and the intended receiver.
Encryption
record every keystroke made on a computer to steal serial numbers for software, to launch Internet attacks, to gain access to
e-mail accounts, to obtain passwords to protected computer systems, or to pick
up personal information such as credit card numbers
keyloggers
devises plans for the restoration of computing and communications services after they
have been disrupted.
focus primarily on the technical
issues involved in keeping systems up and running, such as which files to back
up and the maintenance of backup computer systems
Disaster recovery planning
are specific controls unique to each computerized
application, such as payroll or order processing. They include both automated
and manual procedures that ensure that only authorized data are completely
and accurately processed by that application.
Application Control
Researchers are exploring ways to make computing systems recover even
more rapidly when mishaps occur, an approach called
Recovery oriented computing
examines selected fields in the headers of data packets flowing
back and forth between the trusted network and the Internet, examining individual packets in isolation. T
Packet Filtering
—a review of a specification or design document by a small group
of people carefully selected based on the skills needed for the particular objectives being tested
Walkthrough
is a device about the
size of a credit card that contains a chip formatted with access permission and
other data
Smart Card
Program code defect
bugs
The largest botnet attack in 2010 which started in Spain and spread across the world.
mariposa botnet
is the
scientific collection, examination, authentication, preservation, and analysis of
data held on or retrieved from computer storage media in such a way that the
information can be used as evidence in a court of law. It deals with the following
problems:
* Recovering data from computers while preserving evidential integrity
* Securely storing and handling recovered electronic data
* Finding significant information in a large volume of electronic data
* Presenting the information to a court of law
Computer Forensic
occurs when an individual or computer program fraudulently clicks on an online ad without any intention of learning more about the
advertiser or making a purchase.
Click Fraud
Malicious intruders seeking system access sometimes trick employees
into revealing their passwords by pretending to be legitimate members of the
company in need of information
Social Engineering
the use of public key cryptography working with a CA, is now widely used in e-commerce
Public key Infrastructure
transactions entered online are immediately processed by the computer
Online transaction processing
defines acceptable uses of
the firm’s information resources and computing equipment, including desktop
and laptop computers, wireless devices, telephones, and the Internet
Acceptable Use Policy
monitor network activity and perform vulnerability
testing and intrusion detection.
Managed Security service provider
Identifying the access points in a WiFi network are broadcast multiple times and can be picked up fairly easily by intruders’ sniffer program.
Service Set Indentifier
comprehensive security management
products To help businesses reduce costs and improve manageability, security vendors
have combined into a single appliance various security tools
Unified threat management
The U.S. Congress addressed the threat of computer crime in 1986 with the
Computer fraud and abuse act of 1986
prevent unauthorized users from accessing private networks.
is a combination of hardware and software that controls the flow of
incoming and outgoing network traffic.
Firewall
The ______________ may be
relatively benign, such as the instructions to display a message or image, or it
may be highly destructive—destroying programs or data, clogging computer
memory, reformatting a computer’s hard drive, or causing programs to run
improperly
Payload
involves setting up fake Web sites or sending e-mail or text messages that look
like those of legitimate businesses to ask users for confidential personal data.
Phishing