Exam 2 Flashcards
an attack made before awareness of repair of vulnerabilities are discovered
Zero Day Attack
taking advantage of vulnerabilities
Exploit
Malware that stops users from access unless certain demands are met
Ransomware
Programming code disguised as something else that corrupts an infected computer
Virus
Harmful program that resides in computers’ active memory and duplicates itself
Worm
Seemingly harmless program that hides malicious code & tricks users to open it
Trojan Horse
Combines features of virus, worm, Trojan horse, and other malicious code
Blended Threat
Unsolicited email sent to large numbers of people
Spam
Attack that takes over computers via the Internet flooding a target site with demands for data, etc.
Distributed Denial of Service(DDOS)
Set of programs enabling its users to gain administrator-level access to a computer without consent or knowledge
Rootkit
Intruder gains access to a network and stays undetected intending to steal data over long period
Advanced Persistent Threat(APT)
Fraudulently using email to try to get the recipient to reveal personal data
Phishing
a targeted version of phishing
Spear Phishing
a version of phishing using voicemail
Vishing
a version of phishing using SMS messaging
Smishing
Deployment of malware that steals data from organizations like govt agencies, military contractors, political organizations, or manufacturing firms
Cyberespionage
Intimidation of a govt or civilian population by using IT to disable critical infrastructure
Cyberterrorism
Federal agency created to provide a “safe, more secure America”. Contains the Office of Cybersecurity and Communications.
Department of Homeland Security
Addresses fraud and related activities in association with computers
Computer Fraud and Abuse Act
Addresses false claims regarding unauthorized use of credit cards
Fraud and Related Activity in Connection with Access Devices Statute(FRACADS)
Unlawful access to stored communication to obtain, alter, or prevent authorized access to a wire or electronic communication while in storage
Stored Wire and Electronic Communications and Transactional Records Access Statutes(SWECTRA)
Defined cyberterrorism and associated penalties. This act expired in 2020.
USA Patriot Act
Part of the CIA Security Triad and ensures only those individuals with proper authority can access sensitive data
Confidentiality
Part of the CIA Security Triad and ensures data can only be changed by authorized users
Integrity
Part of the CIA Security Triad and ensures data can be accessed when and where needed
Availability
Process of assessing security-related risks to computers & networks from internal & external threats. Identifies biggest threats and helps focus efforts on fixing said threats.
Risk assessment
Documented process for recovering an organization’s business IS assets, including hardware, software, data, networks, facilities.
Disaster Recovery
Defines security requirements and controls, sanctions needed to meet them: what needs to be done, not how
Security policy