Ethics in Tech Flashcards

1
Q

a cyperattack that takes place before the security community and/or software developers become aware of and fix security vulnerability

A

Zero-day exploits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

malware that keeps you from accessing your accessing data until you meet certain demands

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

umbrella term for a piece of programming code that causes a computer to behave in an unexpected and desirable manner

A

Viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

a harmful program that resides in the active memory of the computer and duplicates itself

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

a seemingly harmless program with malicious code.. infected software seems harmless

A

Trojan Horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

an attack in which a malicious hacker takes over a computer via internet to flood the target site and make it so legitimate users cannot access the site

A

Distributed denial-of-service attack (DDoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

allows a user to gain access administrator-level access to a computer without permission

A

Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

a network attack that allows a hacker to gain access to a network undetected in order to steal data over a period of time

A

Advanced persistent threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

fraudulently using email to try to get a recipient to reveal personal data

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

a type of phishing that sends fraudulent emails to employees

A

Spear Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

a variation of phishing that involves texting

A

Smishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

a variation of phishing that involves voicemail

A

Vishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

the deployment of malware that secretly steals data in the computer system of organizations

A

Cyberespionage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

intimidation of a government or civilian population by using information technology to disable national infrastructure to achieve political, religious, or ideological goals

A

Cyberterrorism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

oversees U.S. cyber and communication infrastructure

A

The Department of Homeland Security’s Office of Cybersecurity and Communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

addresses several fraud related activities such as illegal access, transmitting harmful codes and commands, trafficking passwords, and threatening to damage a computer program

A

Computer fraud and abuse act

17
Q

only people with authority should be able to access data

A

Confidentiality

18
Q

only authorized individuals can make changes to data

19
Q

data can be accessed when and where it is needed

A

Availability

20
Q

the process of assessing security-related risks to an organization’s computers and networks from both internal and external threats

A

Risk-Assessment

21
Q

part of cost-benefit analysis, management must use judgement to assure the cost of protecting a system does not exceed the benefits

A

Reasonable Assurance

22
Q

a documented process for recovering an organization’s assets in the event of a disaster

A

Disaster recovery plan

23
Q

a risk-based plan that allows an organization to carry out its operations in case of a cyberattack or some form of disaster

A

Business continuity plan

24
Q

determining what business processes are most pivotal to an organization

A

Mission-critical process

25
defines an organization's security requirements, as well as controls and sanctions to meet those requirements
Security policy
26
establishes responsibilities and behaviors expected from members of the organization.. evaluates if a security policy is effective and being followed
Security audit
27
limits access to an organization's internal network
Firewall
28
enables users to connect to a safe network, usually from their homes, to only allow the user to connect to the network
Router
29
the process of scrambling messages or data in a way that only authorized parties can read
Encryption
30
protects sensitive data by ensuring privacy between communicating applications and their users on the internet
Transport layer security (TLS)
31
intermediaries between a web browse and another server on the internet
Proxy Server
32
a software or hardware that monitors system and network resources and activities and notifies network security personnel of suspicious activity
Intrustion Detection Systems
33
an approach that is aware of vulnerabilities and watches for attempts to exploit those vulnerabilities
Knowledge-based approach
34
approach that models normal activity and looks for variations from the norm
Behavior-based approach
35
a discipline that combines elements of law and computer science to collect various kinds of data from systems, networks, and storage devices to be used in a court of law
Computer forensics