Chapter 9 Flashcards

1
Q

Trademark:

A

a word, words, or a symbol legally registered as representing a company or a product,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Copyright:

A

represented by the © symbol, protects original works of authorship

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Patent:

A

signifies ownership of an invention for a limited time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Digital products:

A

they don’t make their money from physical assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is in the CIA triad?

A

Confidentiality

Integrity

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Confidentiality:

A

ensuring that private information stays that way

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Snooping (also called Sniffing):

A

occurs when the attacker captures network traffic and then looks for key pieces of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Protocol Analyzer:

A

lets administrators capture network traffic and analyze its contents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are five attacks on confidentiality?

A

Snooping

Eavesdropping

Wiretapping

Social engineering

Dumpster diving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Eavesdropping:

A

a low-tech attack method in which the attacker simply listens to a conversation to gain key information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Wiretapping:

A

occurs when the attacker places a bug to tap into the physical wire on which the communication traveled.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Social Engineering:

A

occurs when an attacker attempts to acquire information about you or your network and system by social means

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Phishing:

A

is a form of social engineering in which someone uses email to ask you for a piece of information that they are missing by making it look as if it is a legitimate request

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Spear phishing:

A

the attacker uses information that the target would be less likely to question because it appears to be coming from a trusted source.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Whaling:

A

phishing for “big” users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Shoulder surfing:

A

involves nothing more than watching someone when they enter their sensitive data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Screen filter:

A

directs the light from the display at a restricted angle so that anyone who isn’t viewing it straight on won’t be able to read it clearly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Dumpster diving:

A

people can go through the dumpster and steal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Integrity:

A

means that the data is accurate and consistent and from the indicated source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are the 4 threats to data integrity?

A

Man-in-the-middle attacks

Replay Attacks

Impersonation

Unauthorized Information Alteration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Man-in-the-middle Attack:

A

Someone secretly places something between a server and the client, and neither party is aware of it.

22
Q

Replay Attack:

A

the attacker captures information from a sender with the intent of using it later

23
Q

Impersonation:

A

pretending to be someone or something that you are not

24
Q

Unauthorized information alteration:

A

is an attack that can also come from internal sources

25
Q

Availability:

A

means that the data is accessible when the user needs it

26
Q

What are the two concerns of availability?

A

Denying Service

Hardware Issues

27
Q

Denial of Service (DoS):

A

flooding a server with a multitude of illegitimate connection request

28
Q

Service outage:

A

any time a service is denied

29
Q

Zombies or Bots:

A

infected systems being commanded across the Internet

30
Q

Power outage:

A

a cause of service denial

31
Q

Uninterruptible power supply (UPS):

A

A battery backup that a server plugs into

32
Q

Physically securing your area prevents two types of problems:

A

Hardware Damage

Hardware Theft

33
Q

Kensington security slot (K-slot):

A

a type of lock that fits into a laptop slot and is attached to a wall or furniture to keep it secure.

34
Q

Malware:

A

software designed to do harm to your computer

35
Q

Exploits:

A

take advantage of flaws in the OS or an application

36
Q

Worms:

A

used to transmit malware

37
Q

Trojan Horses:

A

are applications that mask their true intent

38
Q

Adware:

A

used to display unwanted advertisements

39
Q

Spyware:

A

used to report on your computer and possibly steal data

40
Q

Ransomware:

A

used to extract payments from the infected user

41
Q

Rootkits:

A

conceal themselves on the host OS, allowing for full-control access of the computer at a later date

42
Q

Backdoors:

A

open ports or other routes into your system

43
Q

Keyloggers:

A

record every keystroke and then use that data for identity theft

44
Q

Vulnerability:

A

exists when flaws in the programming create the potential for misuse, an attacker is aware of the flaw, and a tool or technique that the attacker can use to exploit that vulnerability for malicious purposes is readily available.

45
Q

Exploit:

A

when criminals use a vulnerability to attack a system

46
Q

Service pack:

A

a collection of critical updates

47
Q

Virus:

A

a computer code that inserts itself into an executable file

48
Q

Payload:

A

malware carried by a worm

49
Q

Spam:

A

a flood of unsolicited messages that you receive electronically

50
Q

Spambot:

A

spammers program this to send as much emails as possible

51
Q

What is the framework for access control?

A

Authentication

Authorization

Accounting

Auditing

Nonrepuditaion

52
Q

Authentication:

A

happens when the system being logged into validates that the user has proper credentials.