E-commerce Security (II) *MIDTERM CONTENT INCLUSIVE* Flashcards

1
Q

Malicious code (Malware)

A

Includes a variety of threats such as viruses, worms, Trojan horses, and bots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Exploit Kits

A

Collection of exploits bundled together and rented or sold as a commercial product. Use of a kit does not require much skill, allowing for non-fluent digital users to commit cybercrime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Drive-by download

A

Malware that comes with a downloaded file that a user requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Malvertising

A

Online advertising that contains malicious code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Virus

A

A computer program that can replicate or make copies of itself and spread to other files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Worm

A

Malware that is designed to spread from computer to computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Ransomware

A

Malware that blocks or limits access to a computer or network by encrypting files and then demanding a ransom payment, typically in a cyryptocurrency such as Bitcoin, in exchange for the decryption key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Trojan horse

A

Appears to be harmless but then does something other than expected. Often a way for viruses or other malicious code to be introduced into a computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Backdoor

A

Malware feature that allows an attacker to covertly access a compromised computer or network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Bot

A

Type of malicious code that can be covertly installed on a computer when connected to the Internet. Once installed, the bot responds to external commands sent by the attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Botnet

A

A collection of captured bot computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Potentially Unwanted Program (PUP)

A

Program that installs itself on a computer, typically without the user’s informed consent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Adware

A

A PUP that serves pop-up ads to your computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Browser parasite

A

A program that can monitor and change the settings of a user’s browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Cryptojacking

A

Installs a browser parasite that sucks up a computer’s processing power to mine cryptocurrency without the user’s knowledge or consent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Spyware

A

A program used to obtain information such as a user’s keystrokes, e-mails, instant messages, and so on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Social engineering

A

Exploitation of human fallibility and gullibility to distribute malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Phishing

A

Any deceptive, online attempt by a third party to obtain confidential information for financial gain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

BEC (business e-mail compromise) phishing

A

Variation of Nigerian letter scam in which an attacker poses as a high-level employee of a company and requests that another employee transfer funds to what is actually a fraudulent account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Hacker

A

An individual who intends to gain unauthorized access to a computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Cracker

A

Within the hacking community, a term typically used to denote a hacker with criminal intent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Cybervandalism

A

Intentionally disrupting, defacing, or even destroying a site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Hacktivism

A

Cybervandalism and data theft for political purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Data breach

A

Occurs when an organization loses control over corporate information, including the personal information of customers and employees, to outsiders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Credential stuffing

A

Brute force attack that hackers launch via
botnets and automated tools using known username and password combinations obtained from data breaches

26
Q

Identity fraud

A

Involves the unauthorized use of another person’s personal data for illegal financial benefit

27
Q

Spoofing

A

Involves attempting to hide a true identity by using someone else’s e-mail or IP address

28
Q

Pharming

A

Automatically redirecting a web link to an address
different from the intended one, with the site masquerading as the intended destination

29
Q

Spam (junk) websites

A

Also referred to as link farms; promise to offer products or services but, in fact, are just collections of advertisements

30
Q

Sniffer

A

A type of eavesdropping program that monitors the information traveling over a network

31
Q

Man-in-the-middle (MitM) attack

A

Attacker can intercept communications between two parties who believe they are directly communicating with one another, when in fact the attacker is controlling the communications

32
Q

Denial of Service (DoS) attack

A

Flooding a website with useless traffic to inundate and overwhelm the network

33
Q

Distributed Denial of Service (DDoS) attack

A

Using numerous computers to attack the target network from numerous launch points

34
Q

SQL Injection (SQLi) attack

A

Takes advantage of poorly coded web application software that fails to properly validate or filter data entered by a user on a web page

35
Q

Zero-day vulnerability

A

Software vulnerability that has been previously unreported and for which no patch yet exists

36
Q

Encryption & Cipher text

A

The process of transforming plain text or data into cipher text that cannot be read by anyone other than the sender and the receiver

37
Q

The 4 dimensions of e-commerce security encryption provides

A

Message integrity
Nonrepudiation
Authentication
Confidentiality

38
Q

Key (cipher)

A

Any method for transforming plain text to cipher text

39
Q

Substitution cipher

A

Every occurrence of a given letter is replaced systematically by another letter

40
Q

Transposition cipher

A

The ordering of the letters in each word is changed in some systematic way

41
Q

Symmetric key cryptography (secret key cryptography)

A

Both the sender and the receiver use the same key to encrypt and decrypt the message

42
Q

Data Encryption Standard (DES)

A

Developed by the National Security Agency (NSA) and IBM. Uses a 56-bit encryption key

43
Q

Advanced Encryption Standard (AES)

A

The most widely used symmetric key algorithm,
offering 128-, 192-, and 256-bit keys

44
Q

Public key cryptography

A

Two mathematically related digital keys are used: a public key and a private key. The private key is kept secret by the owner, and the public key is widely disseminated. Both keys can be used to encrypt and decrypt a message. However, once the keys are used to encrypt a message, that same key cannot be used to unencrypt the message

Ensures authentication (private key encryption proves who the sender is)

45
Q

Hash function

A

An algorithm that produces a fixed-length number called a hash or message digest

46
Q

Digital signature (e-signature)

A

“Signed” cipher text that can be sent over the Internet

47
Q

Digital certificate

A

A digital document issued by a certification authority that contains a variety of identifying information

48
Q

Certification Authority (CA)

A

A trusted third party that issues digital certificates

49
Q

Public key infrastructure (PKI)

A

CAs and digital certificate procedures that are accepted by all parties

50
Q

Secure negotiated session

A

A client-server session in which the URL of the requested document, along with the contents, contents of forms, and the cookies exchanged, are encrypted

51
Q

Session key

A

A unique symmetric encryption key chosen for a single secure session

52
Q

HTTPS

A

Secure version of the HTTP protocol that uses TLS for encryption and authentication

53
Q

Virtual Private Networks (VPN)

A

Allows remote users to securely access internal networks via the Internet, using the Point-to-Point Tunneling Protocol (PPTP)

54
Q

WPA2

A

Wireless security standard that uses the AES algorithm for encryption and CCMP, a more advanced authentication code protocol

55
Q

WPA3

A

Next-generation WPA protocol that implements more robust security

56
Q

Firewall

A

Refers to either hardware or software that filters communication packets and prevents some
packets from entering the network based on a security policy

57
Q

Proxy server (proxy)

A

Software server that handles all communications originating from or being sent to the Internet, acting as a bodyguard for the organization

58
Q

Intrusion detection system (IDS)

A

Examines network traffic, watching to see if it matches certain patterns or preconfigured rules indicative of an attack

59
Q

Intrusion prevention system (IPS)

A

Has all the functionality of an IDS, with the additional ability to take steps to prevent and block suspicious activities

60
Q

Software supply chain attack

A

Hackers target development environments to infect software that is then downloaded by end users