information security Flashcards

1
Q

the quality or state of
being secure— to be free from danger

A

SECURITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

malware that comes with a downloaded file that a user
requests

A

Drive-by downloads

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

a computer program that has the ability to replicate or make copies of itself,
and spread to other files

A

Viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

malware that is designed to spread from computer to computer

A

Worms-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

malware that prevents you from accessing your computer or files and
demands that you pay a fine

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

appears to be benign, but then does something other than expected.
Often a way for viruses or other malicious code to be introduced into a computer system

A

Trojan horses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

feature of viruses, worms, and Trojans that allows an attacker to remotely access a compromised computer

A

Backdoors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

type of malicious code that can be covertly installed on a computer when
connected to the Internet.

A

Bot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

collection of captured bot computers

A

Botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

is a threat at both the client and the server levels, although servers
generally engage in much more thorough anti-virus activities than do consumers.

A

Malicious code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

program that installs itself on a computer, typically without the user’s informed consent

A

Potentially unwanted programs (PUPs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

a PUP that serves pop-up ads to your computer

A

Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  • a program that can monitor and change the settings of a user’s
    browser
A

Browser parasites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

a program used to obtain information such as a user’s keystrokes, e-mail,
instant messages, and so on

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

any deceptive, online attempt by a third party to obtain confidential information for
financial gain

A

Phishing -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

exploitation of human fallibility and gullibility to distribute
malware

A

Social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

an individual who intends to gain unauthorized access to a computer
system

A

Hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

within the hacking community, a term typically used to denote a hacker
with criminal intent

A

Crackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

cybervandalism and data theft for political purposes

A

Hacktivism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

-intentionally disrupting, defacing, or even destroying a site

A

Cybervandalism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

considered the good guys because they follow the rules when it comes to hacking into systems without permission and obeying responsible disclosure laws

A

white hat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

may have good intentions but might not disclose flaws for immediate fixes
prioritize their own perception of right versus wrong over what the law might say

A

gray hat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

considered cybercriminals; they don’t lose sleep over whether or not something is illegal or wrong
exploit security flaws for personal or political gain–or for fun

A

black hat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

common security threats

A

Malware
PUPs
Phishing
Hacking
Data breach
Sniffing
Insider attacks & unsecure software
Social network & mobile platform issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

types of malware

A

Drive-by downloads
Viruses
Worms
Ransomware
Trojan horses
Backdoors
Bot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

types of PUPs

A

Adware
Browser parasites
Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

PUP stands for?

A

Potentially unwanted programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

types of phishing

A

Social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

types of hacking

A

Crackers
Hacktivism
Cybervandalism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

types of data breach

A

Credit card fraud / theft
Identity fraud
Spoofing
Pharming
Spam

31
Q

types of sniffing

A

Denial of Service (DOS) Attack
Distributed Denial of Service (DDOS) Attack
E-mail wiretaps

32
Q

types of Insider
Attacks & Unsecured Software

A

SQL injection attack
Zero-day vulnerability

33
Q

types of Social
Network & Mobile Platforms

A

Vishing
Smishing
Madware

34
Q

occurs when an organization loses control over its information to outsiders

A

Data breach

35
Q
  • is one of the most feared occurrences on the Internet. Fear
    that credit card information will be stolen prevents users from making online purchases in
    many cases
A

Credit card fraud / theft

36
Q

-involves the unauthorized use of another person’s personal data for
illegal

A

Identity fraud

37
Q

involves attempting to hide a true identity by using someone else’s e-mail
or IP address

A

Spoofing

38
Q

automatically redirecting a web link to an address different from the
intended one, with the site masquerading as the intended destination

A

Pharming

39
Q

also referred to as link farms; promise to offer products or services, but in
fact are just collections of advertisements

A

Spam

40
Q

-flooding a website with useless traffic to inundate and
overwhelm the network

A

Denial of Service (DOS) Attack

41
Q

using numerous computers to attack
the target network from numerous launch points

A

Distributed Denial of Service (DDOS) Attack

42
Q

DOS stands for

A

Denial of Service

43
Q

DDOS stands for

A

Distributed Denial of Service

44
Q

is a type of eavesdropping program that
monitors information traveling over a network

A

Sniffer

45
Q

a method for recording or
journaling e-mail traffic generally at the mail server level from
any individual.

A

E-mail wiretaps

46
Q

the largest financial threats to business institutions come not from robberies
but from embezzlement by insiders

A

Insider Attacks

47
Q

takes advantage of poorly coded web application software that
fails to properly validate or filter data entered by a user on a web page

A

SQL injection attack

48
Q

software vulnerability that has been previously unreported
and for which no patch yet exists

A

Zero-day vulnerability

49
Q

target gullible cell phone users with verbal messages to call a
certain number

A

Vishing

50
Q

exploit SMS/text messages

A

Smishing

51
Q

innocent-looking apps that contain adware that launches pop-up ads
and text messages on your mobile device

A

Madware

52
Q

security management (technology solutions)

A

authentication procedures
encryption
network security protocols
virtual private networks
firewalls
proxy servers
intrusion detection/prevention
automated software updates
anti-virus software
access controls`

53
Q

information security

A

confidentiality
integrity
availability

54
Q

threat to confidentiality

A

snooping
traffic analysis

55
Q

threat to integrity

A

modification
masquerading
replaying
repudiation

56
Q

threat to availability

A

denial of service

57
Q

Protect devices, networks, programs, and data
from attacks and unauthorized access – cyber realm

A

Cybersecurity

58
Q

Protecting the information regardless of the
realm – digital or analog

A

Information Security

59
Q

a message in its natural format readable by an attacker; it is the original
message or data

A

Plaintext

60
Q

a message altered to be unreadable by anyone except the intended
recipients.

A

Ciphertext –

61
Q

– transforming the plaintext, under the control of the key

A

Encryption

62
Q

it is the sequence that controls the operation and behavior of the cryptographic
algorithm

A

Key

63
Q

transforming the ciphertext back to the original plaintext

A

Decryption

64
Q

Any character of plain text from the given fixed set of characters is substituted by some other
character from the same set depending on a key

A

Substitution cipher

65
Q

The Caesar Cipher is a substitution cipher, named after _____.

A

Julius Caesar

66
Q

one which rearranges the order of the letters in the ciphertext
(encoded text), according to some predetermined method, without making any
substitutions.

A

transposition cipher

67
Q

– the secret key is shared between two parties

A

Private key ciphers

68
Q

the secret key is not shared and to parties can still communicate
using public keys.

A

Public key ciphers

69
Q

A common method to create session keys in a distributed manner.
It provides a way for two parties to establish a shared secret key that only two parties
know – even communicating over an insecure channel.

A

Diffie-Hellman Algorithm

70
Q

components of Cryptographic system

A

Plaintext
Ciphertext
Encryption
Key
Decryption

71
Q

types of cipher

A

Private key ciphers
Public key ciphers

72
Q

2 types of transposition cypher`

A

Rail fence cipher
Row transposition ciphers

73
Q
A