Final Exam Flashcards
threat
a person or organization that seeks to obtain or alter data or other IS assets illegally, without the owners permission and often without the owners knowledge
vulnerability
an opportunity for threats to gain access to individual or organizational assets. some exist because there are no safeguards or because the existing safeguards are ineffective
safeguard
any action, device, procedure, technique or other measure that reduces a system’s vulnerability to a threat
target
the asset that is desired by a security threat
pretexting
deceiving someone over the internet by pretending to be another person or organization
phishing
a technique for obtaining unauthorized data that uses pretexting via email. the person doing the deed pretends to be a legitimate company and sends an email requesting confidential data such as account numbers, social security, account passwords etc
phisher
an individual or organization that spoofs legitimate companies in an attempt to illegally capture personal data such as credit card numbers email accounts and driver’s license numbers
spoofing
when someone pretends to be someone else with the intent of obtaining unauthorized data.
IP spoofing
a type of spoofing whereby an intruder uses another site’s IP address as if it were that other site
email spoofing
a synonym for phising. a technique for obtaining unauthorized data that uses pretexting via email. fisheries direct traffic to their sites under the guise of a legitimate business
sniffing
a technique for intercepting computer communications. with wired networks this action requires a physical connection to the network and with wireless networks no such connection is required
wardriver
people who use computers with wireless connections to search for unprotected wireless networks
hacking
a form of computer crime in which a person gains unauthorized access to a computer system. although some people do this for the sheer joy of it, others invade systems for the malicious purpose of stealing or modifying data
usurpation
occurs when unauthorized programs invade a computer system and replace legitimate programs. such unauthorized programs typically shut down the legitimate systems and substitute their own processing to spy, steal and manipulate data or achieve other purposes
denial of service (DoS)
security problem in which users are not able to access an information system; can caused by human errors, natural disaster, or malicious activity
advanced persistent threat (APT)
a sophisticated possibly long running computer hack that is perpetrated by large well funded organizations like governments. as means to engage in cyber warfare
intrusion detection system (IDS)
a computer program that senses when another computer is attempting to scan the disk or otherwise access a computer
brute force attack
a password cracking program that tries every possible combination of characters
cookies
a small file that is stored in the user’s computer by a browser. can be used for authentication, for storing shopping cart contents and user preferences and for other legitimate purposes. can also be used to implement spyware
identification
the process whereby an information system identifies a user by requiring the user to sign on with a username and password
authentification
the process whereby an information system verifies or validates a user
Gramm Leach Bliley (GLB) Act
passed by congress in 1999, this act protects consumer financial data stored by financial institutions which are defined as banks security firms insurance companies and organizations that provide financial advice, prepare tax returns, and provide similar financial services
privacy act of 1974
federal law that provides protections to individuals regarding records maintained by the US government
health insurance portability and accountability act (HIPPA)
the privacy provisions of this 1996 act give individuals the right to access health data created by doctors and other healthcare providers. this also sets rules and limits on who can read and receive a person’s health information
smart cards
plastic cards similar to credit cards that have microchips which holds much more data than a magnetic strip is loaded with identifying data and normally requires a pin
personal identification number (PIN)
a form of authentication action whereby the user supplies a number that only he or she knows
biometric authentication
the use of personal physical characteristics such as fingerprints facial features and retinal scans to authenticate users
encryption
the process of transforming clear text into coded unintelligible text for secure storage of communication
encryption algorithms
these are used to transform clear text into coded unintelligible text for a secure storage or communication
key
1) a column or group of columns that identifies a unique row in a table. also referred to as a primary key 2) a number used to encrypt data. the encryption algorithm applies the key to the original message to produce a coded message. decoding or decrypting a message is similar; a key is applied to the coded message to recover the original text
symmetric encryption
an encryption method whereby the same key is used to encode and to decode the message
asymmetric encryption
an encryption method whereby different keys are used to encode and decode the message; one key encodes the message and the other decodes the message
public key encryption
a special version of asymmetric encryption that is popular on the internet. with this method,each site has a public key for encoding messages and a private key for decoding them
https
an indication that a web browser is using the ssl/tls protocol to provide secure communication
secure sockets layer (SSL)
a protocol that uses both asymmetric and symmetric encryption. when this is in use, the browser dress will begin with https://
transport layer security (TLS)
the new name for a later version of secure sockets layer
firewall
computing devices located between public and private networks that prevent unauthorized access to or from the internal network. this can be a special purpose computer or it can be a program on a general purpose computer or router
perimeter firewall
a firewall that sits outside the organizational network it is the first device that internet traffic encounters
internal firewalls
firewalls that sit inside the organizational network
packet filtering firewall
a firewall that examines each packet and determines whether to let the packet pass. to make this decision it examines the source address the destinations addresses and other data
malware
viruses, worms, trojan horses, spyware and adware
virus
a computer program that replicates itself
payload
the program codes of a virus that causes unwanted or hurtful actions such as deleting programs or data or even worse modifying data in ways that are undetected by the user