Exam 1 Review (Module 1-3) Flashcards
What are the three security goals?
Confidentiality, Integrity, Availability
people cannot read sensitive information, either while it is on a computer or while it is travelling across the network
Confidentiality
Means that attackers cannot change or destroy information, either while it is travelling across a network. Or, at least, if information is changed or destroyed, then the receiver can detect the change or restore destroyed data
Integrity
Means that people who are authorized to use information are not prevented from doing so
Availability
Successful attacks
Also called incidents
Also called breaches
Compromises
Tools used to thwart attacks
Also called safeguards, protections, and controls
Counter measures
an attack that involves sending modified SQL statements to a web application that will, in turn, modify a database.
SQL injection
A shared key for encryption and decryption
Symmetric
Repeatedly guessing the password/key
Brute force attack
Have knowledge of internal systems
Have permissions to access systems
Often know how to avoid detection
Generally are trusted
Ways employees and ex-employees are dangerous
generic name for any “evil software”
Malware
programs that attach themselves to legitimate programs on the victim’s machine
Spread today primarily by e-mail
Also by instant messaging, file transfers, etc.
Viruses
do not attach themselves to other programs; can spread by email, instant messaging, and file transfers
worms
worms that spread extremely rapidly because they do not have to wait for users to act
Direct-propagation worms
Motivated by thrill, validation of skills, sense of power
Motivated to increase reputation among other hackers
Often do damage as a byproduct
Engage in petty crime
Traditional Hackers