Exam 2 Flashcards
Programs typically consist of 3 fundamental flow control patterns, which are:
sequence, selection, and repetition. P. 121
What does VPN stand for?
Virtual private network
The Three primary information security areas are
Authentication and authorization
Are people who they say they are?
Do they have permission?
Prevent and resist a breach
Monitors traffic spanning outside and inside
Prevents a breach
Detection and response (breach occurred)
Respond before damage can be done
What is the most common way to identify individual users, and also the most ineffective form of authentication?
User ID and passwords
What is phishing?
a technique to gain personal information for the purpose of identity theft (sending an email to someone that appears to be from BYU asking for username and password)
What is an example of a simple password?
homer
What is an example of a password with requirements?
Homerjs1
What is an example of a random password?
@#4Tj`9q
What is an example of a passphrase password?
purplemonkeydishwater
Smart cards and tokens are (more/less) effective than a user ID and a password
more
What is a token?
small electronic devices that change user passwords automatically
What is a smart card?
a device that is around the same size as a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing
What are biometrics?
the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting
What is the best and most effective way to manage authentication?
biometrics
What is the most costly and intrusive way to manage authentication?
biometrics
List 3 ways to help prevent and build resistance to attacks
content filtering
encryption
firewall
Know that all of these are threats to security
Fire
Water
Vibration and movement (earthquakes, landslides, explosions)
Severe weather (hurricanes, tornadoes, high winds, severe lightening, etc)
Electrostatic discharge
high humidity causes corrosion, low humidity causes ESD
Electrical noise (EMI and RFI interference)
Electrical anomalies (blackout, brownout, fault, spike, sag, surge, inrush)
Lightning strikes
Magnetic fields
Sabotage/terrorism/war/theft/vandalism
Equipment failure
Loss of communications and utilities
Personnel loss
What are the 3 elements to the CIA triad and what do they represent?
Confidentiality: authentication and authorization (something you know, something you have, who you are)
Availability: authorized users have access when they need it.
Integrity: Protecting data from unauthorized modification or deletion.
What is network sniffing?
Intercepting packages on a wired/wireless network and viewing the contents.
What is the difference between a virus and a worm?
A worm can spread itself without needing users to share the virus
What is a trojan horse virus?
a malicious program disguised to be legitimate/ useful (hence the name trojan horse)
What is the difference between a denial of service and a distributed denial of service?
a denial of service is an army of zombie computers controlled by malware requesting the webpage.
a distributed denial of service is a coordinate effort to flood a system (actual people). For example: registering for classes
Social engineering is considered to be a ____ threat.
Small
Average size
Huge
Huge
True or False: Only people with ‘highly valued’ information are at risk of becoming victim to costly security breaches?
false
What are hactivists?
Hactivists (hackers who are activists) promote political ends through breaking into computers or networks. They may deface a website (changing the appearance or content of a website) that is contrary to their opinion or make confidential information public to accomplish their political objective.
What are cyberterrorists?
Cyberterrorists refer to hackers who use the internet to accomplish terrorist acts. Cyberterrorist acts may include disrupting or destroying an organization’s or nation’s infrastructure, such as disrupting a nation’s power supply or communication lines.
What is a Non-Malicious Insider Threat?
A good intended employee who compromises security through negligence or ignorance
(those 90%+ people who drive you crazy)
what does https stand for?
Hypertext Transfer Protocol Secure