Exam 1 Review (Module 1-3) Flashcards

1
Q

What are the three security goals?

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

people cannot read sensitive information, either while it is on a computer or while it is travelling across the network

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Means that attackers cannot change or destroy information, either while it is travelling across a network. Or, at least, if information is changed or destroyed, then the receiver can detect the change or restore destroyed data

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Means that people who are authorized to use information are not prevented from doing so

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Successful attacks

Also called incidents

Also called breaches

A

Compromises

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Tools used to thwart attacks

Also called safeguards, protections, and controls

A

Counter measures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

an attack that involves sending modified SQL statements to a web application that will, in turn, modify a database.

A

SQL injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A shared key for encryption and decryption

A

Symmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Repeatedly guessing the password/key

A

Brute force attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Have knowledge of internal systems

Have permissions to access systems

Often know how to avoid detection

Generally are trusted

A

Ways employees and ex-employees are dangerous

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

generic name for any “evil software”

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

programs that attach themselves to legitimate programs on the victim’s machine

Spread today primarily by e-mail

Also by instant messaging, file transfers, etc.

A

Viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

do not attach themselves to other programs; can spread by email, instant messaging, and file transfers

A

worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

worms that spread extremely rapidly because they do not have to wait for users to act

A

Direct-propagation worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Motivated by thrill, validation of skills, sense of power

Motivated to increase reputation among other hackers

Often do damage as a byproduct

Engage in petty crime

A

Traditional Hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Call and ask for passwords and other confidential information

Email attack messages with attractive subjects

Piggybacking

Shoulder surfing

Pretexting

Often successful because it focuses on human weaknesses instead of technological weaknesses

A

Social engineering hacking

17
Q

Makes prosecution difficult​

Dupe citizens of a country into being transshippers of fraudulently purchased goods to the attacker in another country​

These are examples of…

A

Cybercrimes

18
Q

Using black market forums (stealing credit card numbers and identity information​,vulnerabilities​, Exploit software (often with update contracts) are used by …

A

Cybercriminals

19
Q

Attacks on confidentiality​

Public information gathering

A

Commercial Espionage

20
Q

May only be litigated if a company has provided reasonable protection for those secrets​

Reasonableness reflects the sensitivity of the secret and industry security practices​

A

Trade secret espionage

21
Q

-Trade secret theft approaches​
-Theft through interception, hacking, and other traditional cybercrimes​
-Bribe an employee​
-Hire your ex-employee and solicit or accept trade secrets​

These are examples of…

A

Commercial Espionage

22
Q

-Attacks on availability​
-Rare, but can be devastating

A

Denial-of-Service Attacks by Competitors

23
Q

Attacks by national governments

A

cyberwar

24
Q

attacks by organized terrorists

A

cyberterror

25
Q
  • Jump to other computers w/o human intervention on receiving computer
  • Computer must have vulnerability for this to work
  • Spread extremely rapidly
A

Direct-Propagation worms

26
Q
  • Program that replaces an existing system file, taking its name
  • MASQUERADES AS A BENEFICIAL PROGRAM
A

Trojan Horses

27
Q
  • Executable code on a webpage
  • Executed automatically when the webpage is downloaded
  • Javascript, Microsoft Active-X controls, etc.
  • Does damage if computer has vulnerability
A

Mobile Code

28
Q
  • Strong technical skills and dogged persistence
  • Create hacker scripts to automate work
  • Scripts also used to write viruses and other malware
A

Expert Attackers (Elite Hackers)

29
Q
  • Use premade scripts to make attacks
  • Low technical skill
  • Dangerous b/c of large numbers
A

Script Kiddies

30
Q

Readable message

A

Plain text message

31
Q

Encrypted (unreadable) message

A

Ciphertext

32
Q

Process of transforming plain text into ciphertext for secure storage or communication

A

Encryption

33
Q

Process of transforming ciphertext message back to plain text message

A

Decryption

34
Q

Mathematical calculation used in encryption/decryption

A

Cryptographic algorithm