IA 2 - UNIT 4 Flashcards

1
Q

Focuses in protecting computers, networks, program and data from unintended or authorized access, change or destruction.

A

Cybersecurity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

is the environment in which communication over computer networks occurs

A

Cyberspace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

3 Features of Security

A
  1. confidentiality
  2. integrity
  3. availability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

is a crime that involves computer, the network that may been used in the commission of a crime or it may be the target

A

Cybercrime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

It includes cybersquatting, cybersex, child pornography, identity theft, illegal access to data and libel..

A

CybercrimePrevention Act of 2012,
officially recorded as Republic Act No. 10175

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Types of Malwares

A
  1. trojan
  2. virus
  3. worm
  4. spyware
  5. ransomare
  6. adware
  7. rootkit
  8. keylogger
  9. remote access
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SECURITY TOOLS

A
  1. Network Security Monitoring
  2. Encryption
  3. Web Vulnerability Scanning
  4. Penetration Testing
  5. Packet Sniffers And Password Auditing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

identifying intrusions and detecting threats from both outside and within the organization.

A

Network Security Monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

process of encoding a message or information in such a way that only authorized parties can access it and those who are not authorized cannot

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  • software program which performs automatic black box testing on a web application and identifies security vulnerabilities.
  • Scanners do not access the source code, they only perform functional testing and try to find security vulnerabilities.
A

Web Vulnerability Scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  • also called pen testing or ethical hacking,
  • is the practice of testing a computer system, network or web application to find security vulnerabilities that an attacker could exploit.
  • So it can be automated with software applications or performed manually.
A

Penetration Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

7 Best Cyber Security Penetration Testing Tools

A
  1. metasploit
  2. nmap
  3. wireshark
  4. aircrack-ng
  5. John the Ripper
  6. Nessus
  7. Burpsuite
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  • It is a small program that listens to all traffic in the attached network(s), builds data streams out of TCP/IP packets,
  • and extracts user names and passwords from those streams that contain protocols that send clear text passwords.
A

Packet Sniffers And Password Auditing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Security Devices

A
  1. Video Management Platforms
  2. Video Surveillance
  3. Video Recording Devices
  4. Intrusion detection system (IDS)
  5. Intrusion prevention systems (IPS)
  6. Access Control Devices
  7. Firewalls
  8. Unified Threat Management
  9. Antivirus
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

surveillance systemcapable of capturing images andvideosthat can be compressed, stored or sent over communication networks

A

Video Surveillance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Records and stores recorded footages

A

Video Recording Devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
  • a device or software application that monitors a network for malicious activity or policy violations.
  • Any malicious activity or violation is typically reported or collected centrally using a security information and event management system
A

Intrusion
detection system (IDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
  • a network security device that can not only detect intruders, but also prevent them from successfully launching any known attack.
  • combine the abilities of firewalls and intrusion detection systems.
A

Intrusion prevention systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
  • They prevent access to sensitive resources.
  • For high protection of properties and resources, possession of well-designed and technically sound access control devices has become a trend
A

Access Control Devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
  • It is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.
  • have been a first line of defense in network security for over 25 years.
A

Firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
  • It is a category of security appliances which integrates a range of security features into a single appliance.
  • appliances combine firewall, gateway anti-virus, and intrusion detection and prevention capabilities into a single platform.
A

Unified Threat Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Also known as anti-malware, it is a computer program used to prevent, detect and remove malware

A

Antivirus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

In securing one’s systems,
actions must be taken in three
areas

A
  1. prevention
  2. detection
  3. response
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

involves those actions taken to discover failures in prevention (realizing that 100% prevention is never possible);

A

detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

involves all those actions one must take to attempt to prevent unauthorized access to a system

A

PREVENTION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

is generally considered to include recovery measures, but might also include efforts to uncover what has been done to the system in the attack and how it was done

A

Response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Types of Intrusion

A
  1. PHYSICAL INTRUSION
  2. TARGET INTRUSION
  3. RANDOM INTRUSION
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

occurs when an intruder has physical access to a machine

A

PHYSICAL INTRUSION

29
Q

occurs on a particular system (or host machine) and can be initiated by an authorized user with an account, an unauthorized user masquerading as an authorized user (e.g., with a stolen password)

A

TARGET INTRUSION

30
Q

a system is attacked simply due to the fact that a door was left open for access into the system and that door was discovered by happenstance over the network when intruders were looking for access into randomly selected potential systems

A

RANDOM INTRUSION

31
Q
  • works in a similar way, baiting a trap for hackers.
  • It’s a sacrificial computer system that’s intended to attract cyberattacks, like a decoy.
  • It mimics a target for hackers, and uses their intrusion attempts to gain information about cybercriminals and the way they are operating or to distract them from other targets
A

HONEYPOT

32
Q
  • technique that hackers use to entice victims into risky circumstances.
  • Although it can take many forms, they usually entail developing a false identity or online presence to win over an unsuspecting victim
A

HONEY TRAP

33
Q

is a centralized collection of honeypots and
analysis tools

A

HONEY FARM

34
Q

DIFFERENT TYPES OF HONEYPOT AND
HOW THEY WORK

A
  1. spam trap
  2. decoy database
  3. malware honeypot
  4. spider honeypot
35
Q

place a fake email address in a hidden location where only an automated address harvester will be able to find it

A

spam trap

36
Q

can be set up to monitor software vulnerabilities and spot attacks exploiting insecure system architecture or using SQL injection, SQL services exploitation, or privilege abuse

A

DECOY DATABASE

37
Q
  • is intended to trap webcrawlers (‘spiders’) by creating web pages and links only accessible to crawlers.
  • Detecting crawlers can help you learn how to block malicious bots, as well as ad-network crawlers.
A

SPIDER
HONEYPOT

38
Q

a single service or computer on a network,
that is configured to act as a decoy, attracting and
trapping would-be attackers

A

honeypot

39
Q
  • collection of high-interaction honeypots designed to capture extensive information on threats.
  • It is a combination of several honeypots to represent a
    network subnet
A

HONEYNET

40
Q

provide real operating systems and services with real content with which attacker can interact.

A

high-interaction
honeypots

41
Q

is one that uses emulated services and signatures to respond to an attacker’s probes.

A

low-interaction
honeypot

42
Q

LEGAL RISK OF DEPLOYMENT

A
  1. Entrapment
  2. Wiretapping
  3. The Patriotic Act
  4. Pen Trap Act
43
Q
  • is defined as enticing the other party to commit an act that he/she was not already predisposed to do.
  • the action of tricking someone into committing a crime in order to secure their prosecution
  • his style of investigation constitutes entrapment
A

ENTRAPMENT

44
Q

was enacted to limit the ability for any individual to intercept communications

A

The Wiretap Act

45
Q

allows the government to monitor electronic
communication when in conjunction with an ongoing
investigation

A

THE PATRIOT ACT

46
Q

This statute prohibits the capture of non-content related
data like the information contained in the IP-packet
headers

A

PEN TRAP ACT

47
Q

TWO ISSUES THAT MUST BE ADDRESSED WHEN
DEVELOPING AND DEPLOYING A HONEY NET

A
  1. data control
  2. data capture
48
Q
  • is crucially important to the implementation of a honey net.
  • The key to protecting the rest of your network is to provide a mechanism for catching and mitigating all outbound packets.
A

Data control

49
Q
  • The honey net won’t help you if you don’t record the data and set alerts.
  • The data can also be utilized for forensic investigation to understand more about the attack in addition to capturing traffic for event notification
A

Data Capture

50
Q

The word steganography is derived from
the Greek words

A

steganos (meaning hidden or covered) and the Greek root graph
(meaning to write)

51
Q

The term was first used in the 14th
century by the German mathematician —— as the title
for his book ——-

A

Johannes Trithemius (1606)
Steganographia

52
Q
  • approach allows the last bit in a byte to be altered.
  • While one might think that this would significantly alter the colors in an image file, it does not.
  • In fact, the change is indiscernible to the human eye.
A

least significant bit
(LSB)

53
Q
  • is hiding and protecting the content of information
  • messages can be transported by themselves
A

cryptography

54
Q
  • hides the presence of information itself
  • to hide information, the secret content has to be hidden in a cover message
  • refers to the technique of hiding secret messages into media such as text, audio, image and video without any suspicion
A

steganography

55
Q

is the art and
science of detection of the
presence of steganography

A

steganalysis

56
Q

the scientific bridge between law and computer science that
allows digital evidence to be collected in a legally sound manner

A

COMPUTER FORENSICS

57
Q
  • a branch of forensic science that focuses on identifying, acquiring, processing, analysing, and reporting on data stored electronically
  • dependent on the integrity, dependability, and admissibility of digital evidence in judicial proceedings
  • process of locating, safeguarding, analyzing, and documenting digital evidence
A

DIGITAL
FORENSIC

58
Q

digital forensic investigation process

A
  1. identification
  2. documentation
  3. preservation
  4. analysis
  5. presentation
59
Q

digital forensic investigation process - identification

A

identify purpose of investigation & resource required

60
Q

digital forensic investigation process - documentation

A

document the crime scene with the help of photographic sketches

61
Q

digital forensic investigation process - preservation

A

isolate from network, secure and preserve the device

62
Q

digital forensic investigation process - analysis

A

identify tools and techniques to use and interpret the analysis results

63
Q

digital forensic investigation process - presentation

A

report the findings in a legally acceptable manner

64
Q

PREREQUISITES OF A
COMPUTER
FORENSIC EXAMINER

A
  1. forensic skills
  2. forensic techniques and tools
  3. media and file system forensics
65
Q

The foremost common forensic
skill is

A

scientific method in which it ensures that the examiner is merely a finder of facts.

66
Q

the expert must by supported by forensically sound skills, tools, and methods.

A

FORENSIC TECHNIQUES AND TOOLS

67
Q

Successful forensic analysis requires a thorough
knowledge of file types and digital media
used to store data and the file structures
used on those devices

A

MEDIA AND FILE SYSTEM FORENSICS

68
Q

types of digital forensics

A
  1. media forensics
  2. network forensics
  3. wireless forensics
  4. database forensics
  5. software forensics
  6. email forensics
  7. memory forensics
  8. mobile phone forensics