Ethics in Tech Flashcards

1
Q

a cyperattack that takes place before the security community and/or software developers become aware of and fix security vulnerability

A

Zero-day exploits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

malware that keeps you from accessing your accessing data until you meet certain demands

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

umbrella term for a piece of programming code that causes a computer to behave in an unexpected and desirable manner

A

Viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

a harmful program that resides in the active memory of the computer and duplicates itself

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

a seemingly harmless program with malicious code.. infected software seems harmless

A

Trojan Horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

an attack in which a malicious hacker takes over a computer via internet to flood the target site and make it so legitimate users cannot access the site

A

Distributed denial-of-service attack (DDoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

allows a user to gain access administrator-level access to a computer without permission

A

Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

a network attack that allows a hacker to gain access to a network undetected in order to steal data over a period of time

A

Advanced persistent threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

fraudulently using email to try to get a recipient to reveal personal data

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

a type of phishing that sends fraudulent emails to employees

A

Spear Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

a variation of phishing that involves texting

A

Smishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

a variation of phishing that involves voicemail

A

Vishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

the deployment of malware that secretly steals data in the computer system of organizations

A

Cyberespionage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

intimidation of a government or civilian population by using information technology to disable national infrastructure to achieve political, religious, or ideological goals

A

Cyberterrorism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

oversees U.S. cyber and communication infrastructure

A

The Department of Homeland Security’s Office of Cybersecurity and Communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

addresses several fraud related activities such as illegal access, transmitting harmful codes and commands, trafficking passwords, and threatening to damage a computer program

A

Computer fraud and abuse act

17
Q

only people with authority should be able to access data

A

Confidentiality

18
Q

only authorized individuals can make changes to data

A

Integrity

19
Q

data can be accessed when and where it is needed

A

Availability

20
Q

the process of assessing security-related risks to an organization’s computers and networks from both internal and external threats

A

Risk-Assessment

21
Q

part of cost-benefit analysis, management must use judgement to assure the cost of protecting a system does not exceed the benefits

A

Reasonable Assurance

22
Q

a documented process for recovering an organization’s assets in the event of a disaster

A

Disaster recovery plan

23
Q

a risk-based plan that allows an organization to carry out its operations in case of a cyberattack or some form of disaster

A

Business continuity plan

24
Q

determining what business processes are most pivotal to an organization

A

Mission-critical process

25
Q

defines an organization’s security requirements, as well as controls and sanctions to meet those requirements

A

Security policy

26
Q

establishes responsibilities and behaviors expected from members of the organization.. evaluates if a security policy is effective and being followed

A

Security audit

27
Q

limits access to an organization’s internal network

A

Firewall

28
Q

enables users to connect to a safe network, usually from their homes, to only allow the user to connect to the network

A

Router

29
Q

the process of scrambling messages or data in a way that only authorized parties can read

A

Encryption

30
Q

protects sensitive data by ensuring privacy between communicating applications and their users on the internet

A

Transport layer security (TLS)

31
Q

intermediaries between a web browse and another server on the internet

A

Proxy Server

32
Q

a software or hardware that monitors system and network resources and activities and notifies network security personnel of suspicious activity

A

Intrustion Detection Systems

33
Q

an approach that is aware of vulnerabilities and watches for attempts to exploit those vulnerabilities

A

Knowledge-based approach

34
Q

approach that models normal activity and looks for variations from the norm

A

Behavior-based approach

35
Q

a discipline that combines elements of law and computer science to collect various kinds of data from systems, networks, and storage devices to be used in a court of law

A

Computer forensics