Chapter 9 Flashcards
Security Concepts and Threats
What is Intellectual property?
Exclusive rights to sell an idea or product for a fair period of time.
What are the 3 ways to protect intellectual property?
Trademarks
Copyright
Patents
What is a Trademark?
Word, words or symbols that are legally registered as representing a company or a product.
Give an example of a Trademark
Just Do It
What are the symbols of a Trademark?
TM
(R)
SM
What is the symbol for Copyright?
(c)
What does Copyright do?
Protects the company brand.
Protects original works or authorship
What does a patent means
It signifies ownership of an invention for limited time.
Do you need to renew a patent?
Yes
What do Social media companies exist as?
Digital Products
Do Social media companies make their money from physical assets?
No
What is the CIA triad?
Confidentiality
Integrity
Availability
What is confidentiality interns of it security?
Ensuring that private information remains private.
What are the different types of attacks there can be on confidentiality?
Snooping Eavesdropping Wiretapping Social engineering Dumpster diving
What is the other name for Snooping?
Sniffing
What is a sniffer?
A snooping tool
It is a protocol analyzer - A popular tool originally made by Network General now NETSCOUT.
What does a protocol analyzer do?
Let’s administrators capture network traffic and analyze it’s contents
Are there wired and wireless protocols?
Yes
What happens in a snooping attack?
A protocol analyzer is used
The attacker captures network traffic and then looks for key pieces of information.
What would happen without encryption?
Data sent would be an easy target for someone with a sniffer within range of the network.
What is eavesdropping?
Low tech attack method in which the attacker simply listens to a conversation to get key network info
Can video cameras, and microphones be used in eavesdropping?
Yes
How is wiretapping done?
By placing a monitoring device in someone’s phone
What is the other name for the monitoring device place in phones for wiretapping?
Bug
Where can wiretapping take place?
Land lines Network cable Cellular WiFi Other wireless connections
What is Social Engineering?
The process in which an attacker attempts to acquire info about you or your network and system by social means such as talking to people in the organization, phone, email or in person
What kind of information can you get from social engineering?
User id Password Preferred email address Telephone no Physical address Personal info (age, date of birth, maiden name, school, favorite sport team and music
Why does social engineering work?
The personal touch is always the hardest to resist and the individuals are good at encouraging you to reveal personal info
What is the golden rule to prevent social engineering
Never give our info on you or anyone one else to anyone whom you are not sure of
What is phishing?
A form of social engineering in which someone uses email to ask you for a piece of information they are missing by making it look like an legitimate address,?
How do you counter measure phishing?
Hover over the link to see the URL
Give 2 forms of phishing
Spear phishing (targetted phising) Whaling(trying to attack the head)
How do you deal with Social Engineering?
Never give Password User I'd Over the phone To anyone anymore who has not been positively identified
What is shoulder surfing
Looking over onee shouldefto get info
What does integrity means in IT?
Data is accurate and consistent and from the indicated source.
List 4 integrity threats
Man-In-The-Middle attack
Replay attacks
Impersonation
Unauthorized information alteration
Explain Man-In-The-Middle attack
Secretly placing a piece of software or an unauthorized rogue router between a server and the client and neither party is aware of it.
The mitm attack software intercepts data and then send the info back and forth as if nothing is happening
How is the Man-In-The-Middle attack accomplished
Via a form of wiretapping
How does the Man-In-The-Middle software create a confidentiality concern?
The software may be recording info for someone to view later
How does the Man-In-The-Middle software create an integrity concern?
Attackers might also alter the data
What is a common solution to Man-In-The-Middle attacks
Enforce a secure wireless authentication protocol such as WPA2
What happens during Replay Attacks?
The attacker captures info from a sender with the intention of using it later
Can snooping or wiretapping be a Replay Attack?
Yes
Give an example of Replay Attack
Capturing transmission from a client computer and later replaying the message to the server in an effort to gain unauthorized access
What is impersonation
Pretending to be someone or something that you are not
Can Unauthorized information alteration come from an internal source?
Yes
What is an availability concern?
That data is accessible when the user needs it
What are the 2 causes of of Availability concern?
Denying Service
Hardware issues
What is a DoS?
Denial of Service
How does a DoS work?
Server flooded with multiple illegitimate connection requests making it unable to respond to legitimate request
How does a DDoS work?
After the administrator tries to resolve a DoS, by using the firewall to shut it down.. hackers command Zombies or bots and execute a distributed denial of service
What can be hit by DoS attack?
Web servers
Wireless network
What is UPS
Uninterrupted power supply
Which devices are hackable?
All devices connected to the internet.
Give an example of a device that is not hackable
Gameboy…it’s not connected to the internet
What is DDoS
Distributed Denial of service
What does DoS attack?
Web servers and wireless network
How can you address a power outage?
Use a UPS
What does UPS stand for?
Uninterrupted power supply