information security Flashcards

1
Q

Common Security Threats

A

Malware
potentially unwanted programs (Pups)
phishing
hacking
data breach
sniffing
attacks and unsecured software
Network & Mobile Platforms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

malware stands for

A

malicious software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

malware that comes with a downloaded file that a user requests

A

Drive-by downloads

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

a computer program that has the ability to replicate or make copies of itself,
and spread to other files

A

Viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

-malware that is designed to spread from computer to computer

A

worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

malware that prevents you from accessing your computer or files and
demands that you pay a fine

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

-appears to be benign, but then does something other than expected.
Often a way for viruses or other malicious code to be introduced into a computer system

A

Trojan horses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

feature of viruses, worms, and Trojans that allows an attacker to remotely
access a compromised computer

A

backdoors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  • type of malicious code that can be covertly installed on a computer when
    connected to the Internet. Once installed, the bot responds to external commands sent by the attacker
A

bot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  • collection of captured bot computers
A

botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

is a threat at both the client and the server levels, although servers
generally engage in much more thorough anti-virus activities than do consumers.

A

Malicious code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

program that installs itself on a computer, typically without the user’s informed consent

A

Potentially unwanted programs (PUPs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

a PUP that serves pop-up ads to your computer

A

adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

a program that can monitor and change the settings of a user’s browser

A

Browser parasites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

a program used to obtain information such as a user’s keystrokes, e-mail,
instant messages, and so on

A

spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

any deceptive, online attempt by a third party to obtain confidential information for
financial gain

A

phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

exploitation of human fallibility and gullibility to distribute malware

A

Social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

an individual who intends to gain unauthorized access to a computer
system

A

hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

within the hacking community, a term typically used to denote a hacker
with criminal intent

A

Crackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

cybervandalism and data theft for political purposes

A

Hacktivism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

-intentionally disrupting, defacing, or even destroying a site

A

Cybervandalism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

occurs when an organization loses control over its information to outsiders

A

Data breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

is one of the most feared occurrences on the Internet. Fear that credit card information will be stolen prevents users from making online purchases in
many cases.

A

Credit card fraud / theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

involves the unauthorized use of another person’s personal data for illegal

A

Identity fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
involves attempting to hide a true identity by using someone else’s e-mail or IP address
Spoofing
26
automatically redirecting a web link to an address different from the intended one, with the site masquerading as the intended destination
Pharming
27
- also referred to as link farms; promise to offer products or services, but in fact are just collections of advertisements
spam
28
-flooding a website with useless traffic to inundate and overwhelm the network
Denial of Service (DOS) Attack
29
using numerous computers to attack the target network from numerous launch points
Distributed Denial of Service (DDOS) Attack
30
is a type of eavesdropping program that monitors information traveling over a network
sniffer
31
a method for recording or journaling e-mail traffic generally at the mail server level from any individual.
E-mail wiretaps
32
the largest financial threats to business institutions come not from robberies but from embezzlement by insiders
Insider Attacks
33
takes advantage of poorly coded web application software that fails to properly validate or filter data entered by a user on a web page
SQL injection attack
34
- software vulnerability that has been previously unreported and for which no patch yet exists
Zero-day vulnerability
35
verbal phishing
vishing
36
uses SMS to perform phishing
Smishing
37
mobile adware
madware
38
Technology Solutions
encryption authentication procedures access controls anti-virus software proxy servers firewalls
39
3 types of information security
cryptography steganography watermarking
40
putting an information in different media elements
steganography
41
putting original ownership
watermarking
42
information needs to be hidden from unauthorized access
confidentiality
43
Protected from unauthorized change
integrity
44
Available to an authorized entity when it is needed
availability
45
Security attacks that is threat to confidentiality
snooping traffic analysis
46
Security attacks that is threat to integrity
modification masquerading replaying repudiation
47
security attacks that is threat to availability
denial of service
48
Protect devices, networks, programs, and data from attacks and unauthorized access – cyber realm
Cybersecurity
49
Protecting the information regardless of the realm – digital or analog
Information Security
50
one of the essential method of information system
cryptography
51
a message in its natural format readable by an attacker; it is the original message or data
Plaintext
52
– a message altered to be unreadable by anyone except the intended recipients.
ciphertext
53
transforming the plaintext, under the control of the key
encryption
54
it is the sequence that controls the operation and behavior of the cryptographic algorithm
Key
55
transforming the ciphertext back to the original plaintext
Decryption
56
Any character of plain text from the given fixed set of characters is substituted by some other character from the same set depending on a key
Substitution cipher
57
it is a substitution cipher, named after Julius Caesar
The Caesar Cipher
58
is one which rearranges the order of the letters in the ciphertext(encoded text), according to some predetermined method, without making any substitutions.
transposition cipher
59
Types of ciphers
Private key ciphers Public key ciphers
60
the secret key is shared between two parties
Private key ciphers
61
the secret key is not shared and to parties can still communicate using public keys
Public key ciphers