Exam 1 Review (Module 1-3) Flashcards
What are the three security goals?
Confidentiality, Integrity, Availability
people cannot read sensitive information, either while it is on a computer or while it is travelling across the network
Confidentiality
Means that attackers cannot change or destroy information, either while it is travelling across a network. Or, at least, if information is changed or destroyed, then the receiver can detect the change or restore destroyed data
Integrity
Means that people who are authorized to use information are not prevented from doing so
Availability
Successful attacks
Also called incidents
Also called breaches
Compromises
Tools used to thwart attacks
Also called safeguards, protections, and controls
Counter measures
an attack that involves sending modified SQL statements to a web application that will, in turn, modify a database.
SQL injection
A shared key for encryption and decryption
Symmetric
Repeatedly guessing the password/key
Brute force attack
Have knowledge of internal systems
Have permissions to access systems
Often know how to avoid detection
Generally are trusted
Ways employees and ex-employees are dangerous
generic name for any “evil software”
Malware
programs that attach themselves to legitimate programs on the victim’s machine
Spread today primarily by e-mail
Also by instant messaging, file transfers, etc.
Viruses
do not attach themselves to other programs; can spread by email, instant messaging, and file transfers
worms
worms that spread extremely rapidly because they do not have to wait for users to act
Direct-propagation worms
Motivated by thrill, validation of skills, sense of power
Motivated to increase reputation among other hackers
Often do damage as a byproduct
Engage in petty crime
Traditional Hackers
Call and ask for passwords and other confidential information
Email attack messages with attractive subjects
Piggybacking
Shoulder surfing
Pretexting
Often successful because it focuses on human weaknesses instead of technological weaknesses
Social engineering hacking
Makes prosecution difficult
Dupe citizens of a country into being transshippers of fraudulently purchased goods to the attacker in another country
These are examples of…
Cybercrimes
Using black market forums (stealing credit card numbers and identity information,vulnerabilities, Exploit software (often with update contracts) are used by …
Cybercriminals
Attacks on confidentiality
Public information gathering
Commercial Espionage
May only be litigated if a company has provided reasonable protection for those secrets
Reasonableness reflects the sensitivity of the secret and industry security practices
Trade secret espionage
-Trade secret theft approaches
-Theft through interception, hacking, and other traditional cybercrimes
-Bribe an employee
-Hire your ex-employee and solicit or accept trade secrets
These are examples of…
Commercial Espionage
-Attacks on availability
-Rare, but can be devastating
Denial-of-Service Attacks by Competitors
Attacks by national governments
cyberwar
attacks by organized terrorists
cyberterror
- Jump to other computers w/o human intervention on receiving computer
- Computer must have vulnerability for this to work
- Spread extremely rapidly
Direct-Propagation worms
- Program that replaces an existing system file, taking its name
- MASQUERADES AS A BENEFICIAL PROGRAM
Trojan Horses
- Executable code on a webpage
- Executed automatically when the webpage is downloaded
- Javascript, Microsoft Active-X controls, etc.
- Does damage if computer has vulnerability
Mobile Code
- Strong technical skills and dogged persistence
- Create hacker scripts to automate work
- Scripts also used to write viruses and other malware
Expert Attackers (Elite Hackers)
- Use premade scripts to make attacks
- Low technical skill
- Dangerous b/c of large numbers
Script Kiddies
Readable message
Plain text message
Encrypted (unreadable) message
Ciphertext
Process of transforming plain text into ciphertext for secure storage or communication
Encryption
Process of transforming ciphertext message back to plain text message
Decryption
Mathematical calculation used in encryption/decryption
Cryptographic algorithm