Chapter 9 Flashcards

Security Concepts and Threats

1
Q

What is Intellectual property?

A

Exclusive rights to sell an idea or product for a fair period of time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 3 ways to protect intellectual property?

A

Trademarks
Copyright
Patents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a Trademark?

A

Word, words or symbols that are legally registered as representing a company or a product.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Give an example of a Trademark

A

Just Do It

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the symbols of a Trademark?

A

TM
(R)
SM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the symbol for Copyright?

A

(c)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does Copyright do?

A

Protects the company brand.

Protects original works or authorship

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does a patent means

A

It signifies ownership of an invention for limited time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Do you need to renew a patent?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What do Social media companies exist as?

A

Digital Products

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Do Social media companies make their money from physical assets?

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the CIA triad?

A

Confidentiality
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is confidentiality interns of it security?

A

Ensuring that private information remains private.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the different types of attacks there can be on confidentiality?

A
Snooping
Eavesdropping
Wiretapping
Social engineering
Dumpster diving
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the other name for Snooping?

A

Sniffing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a sniffer?

A

A snooping tool

It is a protocol analyzer - A popular tool originally made by Network General now NETSCOUT.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What does a protocol analyzer do?

A

Let’s administrators capture network traffic and analyze it’s contents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Are there wired and wireless protocols?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What happens in a snooping attack?

A

A protocol analyzer is used

The attacker captures network traffic and then looks for key pieces of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What would happen without encryption?

A

Data sent would be an easy target for someone with a sniffer within range of the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is eavesdropping?

A

Low tech attack method in which the attacker simply listens to a conversation to get key network info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Can video cameras, and microphones be used in eavesdropping?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

How is wiretapping done?

A

By placing a monitoring device in someone’s phone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the other name for the monitoring device place in phones for wiretapping?

A

Bug

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Where can wiretapping take place?

A
Land lines
Network cable
Cellular
WiFi
Other wireless connections
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is Social Engineering?

A

The process in which an attacker attempts to acquire info about you or your network and system by social means such as talking to people in the organization, phone, email or in person

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What kind of information can you get from social engineering?

A
User id
Password
Preferred email address
Telephone no
Physical address
Personal info (age, date of birth, maiden name, school, favorite sport team and music
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Why does social engineering work?

A

The personal touch is always the hardest to resist and the individuals are good at encouraging you to reveal personal info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is the golden rule to prevent social engineering

A

Never give our info on you or anyone one else to anyone whom you are not sure of

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is phishing?

A

A form of social engineering in which someone uses email to ask you for a piece of information they are missing by making it look like an legitimate address,?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

How do you counter measure phishing?

A

Hover over the link to see the URL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Give 2 forms of phishing

A
Spear phishing (targetted phising)
Whaling(trying to attack the head)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

How do you deal with Social Engineering?

A
Never give
Password
User I'd
Over the phone
To anyone anymore who has not been positively identified
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is shoulder surfing

A

Looking over onee shouldefto get info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What does integrity means in IT?

A

Data is accurate and consistent and from the indicated source.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

List 4 integrity threats

A

Man-In-The-Middle attack
Replay attacks
Impersonation
Unauthorized information alteration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Explain Man-In-The-Middle attack

A

Secretly placing a piece of software or an unauthorized rogue router between a server and the client and neither party is aware of it.

The mitm attack software intercepts data and then send the info back and forth as if nothing is happening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

How is the Man-In-The-Middle attack accomplished

A

Via a form of wiretapping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

How does the Man-In-The-Middle software create a confidentiality concern?

A

The software may be recording info for someone to view later

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

How does the Man-In-The-Middle software create an integrity concern?

A

Attackers might also alter the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What is a common solution to Man-In-The-Middle attacks

A

Enforce a secure wireless authentication protocol such as WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What happens during Replay Attacks?

A

The attacker captures info from a sender with the intention of using it later

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Can snooping or wiretapping be a Replay Attack?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Give an example of Replay Attack

A

Capturing transmission from a client computer and later replaying the message to the server in an effort to gain unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What is impersonation

A

Pretending to be someone or something that you are not

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Can Unauthorized information alteration come from an internal source?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What is an availability concern?

A

That data is accessible when the user needs it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What are the 2 causes of of Availability concern?

A

Denying Service

Hardware issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What is a DoS?

A

Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

How does a DoS work?

A

Server flooded with multiple illegitimate connection requests making it unable to respond to legitimate request

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

How does a DDoS work?

A

After the administrator tries to resolve a DoS, by using the firewall to shut it down.. hackers command Zombies or bots and execute a distributed denial of service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

What can be hit by DoS attack?

A

Web servers

Wireless network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

What is UPS

A

Uninterrupted power supply

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Which devices are hackable?

A

All devices connected to the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Give an example of a device that is not hackable

A

Gameboy…it’s not connected to the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

What is DDoS

A

Distributed Denial of service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

What does DoS attack?

A

Web servers and wireless network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

How can you address a power outage?

A

Use a UPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

What does UPS stand for?

A

Uninterrupted power supply

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

How can you avoid hardware theft?

A

Use a cable lock

61
Q

What are the 2 major hardware concerns?

A

Damage

Theft

62
Q

What is the best way to secure computer and peripherals?

A

Focus on securing the the environment

63
Q

How can you secure the environment against equipment theft?

A

Use of security keycards to access the office
Having securities present
Keeping doors and windows closed
Being prepared to challenge anyone who isn’t normally a part of your work environment

64
Q

How can you prevent hardware damage and theft?

A

By physically securing your area.

65
Q

What are the tips to securing your laptop?

A
  1. Know where it is at all times
  2. Don’t leave device unattended
  3. Carry an unconventional bag
  4. Install an alarm that beeps if your device gets more than a certain distance away
  5. Use a cable lock
66
Q

Give 2 devices that can secure a laptop

A

K-slot (Kensington security slot)
LoJack
Kill switch

67
Q

How does a lojack work?

A

Track the device through a small radio installed inside the device. Preinstalled in the BIOS

68
Q

How do kill switches work?

A

Disable the device

69
Q

What are the types of malware?

A
  1. Exploits
  2. Viruses
  3. Trojan horses
  4. Adware
  5. Spyware
  6. Ransomware
  7. Backdoors
  8. Keyloggers
70
Q

What does Exploits do?

A

Take advantage of flaws in the OS or application.

71
Q

What does Viruses do?

A

Used to cause damage and or disruption

72
Q

What do worms do?

A

Used to transmit malware.

73
Q

What do Trojan horses do

A

Application that mask their true intent

74
Q

What do adware do?

A

Used to display unwanted advertisement

75
Q

What do spyware do?

A

Used to report on your computer.

76
Q

What do Ransomware do?

A

Used to extract payment from the infected user.

77
Q

What do Rootkits do?

A

Conceal themselves on the host OS, allowing for full control access of the computer at a later date.

78
Q

What do Backdoors do?

A

Open ports or other routes into your system.

79
Q

What do Keyloggers do?

A

Record every keystroke and then use that data for identity theft

80
Q

What is Malware?

A

Anything installed on the computer without their intent and designed dokey for mischief.

Software that is malicious/bad

81
Q

What was the original reason for UAC?

A

Because they couldn’t verify who was on the computer

82
Q

How do OSes guard against exploits?

A

They have mechanisms to update and patch themselves automatically

83
Q

How often should you download and install updates

A

Promptly as they are available

84
Q

What are service packs?

A

Collection of critical updates and minor enhancements that are released as a group

85
Q

What the difference between a service packs and an update?

A

Service pack takes longer to download and install

You usually cannot remove a service pack after it has been installed

86
Q

Which software is the most hacked software and why?

A

Excel

Financial software

87
Q

Where do viruses hide

A

Inside the host file/ RAM

88
Q

How are viruses triggered?

A

By clicking on them

89
Q

What is the main thing about a virus

A

It self replicates

90
Q

Which files do viruses attach themselves to

A

Exe

91
Q

How are viruses classified?

A

By Different attack strategy

By Different consequences

92
Q

What are the different classification of viruses?

A
Polymorphic
Multipartite
Phage
Stealth
Armored
Macrovirus
Retro virus
Companion
93
Q

List symptoms of virus infection

A

1 Program loading slow
2 unusual files on hard drive
3 Files disapearing
4 program size change from installed version
5 browser, word processor app and other software behaving strange
6 system shuts down itself
7 loss of access to a diskdrive or system resource
8 System not rebooting

94
Q

What should be done if a system is infected?

A

Quarantine

95
Q

How are viruses detected and removed?

A

Antivirus software

96
Q

How is a virus different from a worm?

A

It’s self contained
It doesn’t need a host application to be transported
It can reproduce itself

97
Q

What is a payload

A

The additional malware that a worm might carry. It is a worm

98
Q

Can worms be active or passive?

A

Yes

99
Q

What does an active worm do?

A

Self transport

100
Q

What does a passive worm do?

A

Rely on user’s innocence to transport them normally through email or social media

101
Q

What can be used to detect and remove worms

A

Most anti-malware programs

102
Q

What is the most common way that Trojan horses spread?

A

Via worms

103
Q

What is a Trojan horse?

A

An application that enters the system or network disguised as another program.

104
Q

What kind of malware is one that claims to scan your system for malware but instead installs a Keylogger?

A

Trojan horse

105
Q

What does a Keylogger do?

A

Records keystroke with the intention of use the information to impersonate you

106
Q

Do Trojan horse replicate

A

No

107
Q

What do adware do?

A

Display unrequsted ads on a computer

108
Q

What do spyware do?

A

Record computer usage

109
Q

Are spyware self replicating

A

No

110
Q

How is spyware spread

A

Through low level social engineering

111
Q

What is the most common way to get spyware?

A

Install a free application from a website
Or
Run Active X or Java component

112
Q

Which application is designed to remove Spyware?

A

Windows Defender

113
Q

What is Windows defender?

A

An antivirus designed for Windows which is installed by default

114
Q

What does Ransomware do?

A

Extorts the infected users for money

115
Q

What is cryptoviral extortion

A

The name given to Ransomware threat

116
Q

What software blocks Ransomware?

A

Most anti-malware software

117
Q

If your system is infected, locked or encrypted by ransomware what can be done?

A

you can wipe your system and restore from backup

118
Q

Where do you associate rootkits

A

In the OS

119
Q

What is a Rootkits used for

A

To access Exploits

120
Q

What is Backdoor?

A

A method to circumvent the normal security system on a computer

121
Q

How can backdoors take place?

A

By not changing a default password

122
Q

What is used to create a backdoor?

A

A worm

123
Q

How can spam be sent?

A
Email
Instant message
Blog
Smart phone
Message group
Online classification
124
Q

What is the name of the program that generates spam

A

Spambot

125
Q

What is the best way to handle spam

A

Delete it

126
Q

What is the brute Force password cracking method?

A

When a program tries random strings of characters in an attempt to guess your password

127
Q

What is the Triple A framework in Access control

A

Authentication - who are you
Authorization
Accounting

128
Q

What are the types of Authentication?

A

Single Factor authentication

Multifactor authentication

129
Q

Explain single Factor authentication

A

Only need one piece of information other than username

130
Q

Is single Factor authentication secure

A

No

131
Q

Explain multifactor authentication

A
Use username + 2 or more others
Something you know -password
Something you have- smart card
Something you are
Somewhere you are
132
Q

What is an algorithm?

A

A set of instructions.

133
Q

Is having Single sign on a good practice

A

No

134
Q

What does Authorization do

A

Determines what the user can do?

135
Q

What are the 4 access control methods?

A

Mandatory Access control
Discretionary Access control
Role based access control
Rule based access control

136
Q

What happens with Mandatory access control?

A

Everything is locked until you are given permission

137
Q

Where is mandatory access control used

A

In highly secure environment

138
Q

What happens with Discretionary Access control?

A

Users are allowed to set their own security

They manage privileges based on ACL

139
Q

If the question is asked

Is this person authorized to get into the system. What access control methods is being used?

A

Authentication

140
Q

What is Role based access control

A

Access is granted to an entire role

141
Q

Who controls role based access control

A

The administrator

142
Q

If accounts can only be assigned to one role at a time what access control method is that

A

Role based

143
Q

What happens in rule based access control?

A

Uses ACL list and an administrator defines the rules that allow or deny access to resources

144
Q

What happens in Accounting Access control?

A

It keeps track of what is happening/keeps a log

145
Q

Where can you go to see Windows log?

A

Event Viewer

146
Q

What is the goal of non repudiation?

A

To make it so that people cannot deny that an event took place

147
Q

What are the 4 methods of repudiation?

A

Video
Biometric _ very strong form
Signature
Receipt

148
Q

What is spoofing?

A

Sending fake information.

149
Q

Would you find spoofing taking place
Replay Attack
Impersonation

A

Impersonation