Information Security Flashcards

1
Q

Motivation of bad guys

A
Account theft and illegal funds transfer
Stealing personal OR financial data
Compromising computing or financial data
Extortion
Intellectual property theft
Espionage
Cyberwarfare
Terrorism
Pranksters
Hacktivism
Revenge
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data harvesters

A

infiltrate systems and collect data for illegal resale

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cash-out fraudsters

A

purchase data from data harvester and use stollen credit card data for illegal actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Botnets OR zombie computers

A

Networks infiltrated and compromised machines controlled by central command and used for nefarious activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Hacktivists

A

protesters seeking to make political point by leveraging tech tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

White hat hacker

A

Good guys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Black hat hacker

A

Bad guys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Social engineering

A

Tricking employees into revealing info without computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Phishing

A

Tricking someone to install malicious software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

spoofed email adress

A

altered to seem as if it came from another source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Zero-day exploits

A

Attacks that are so new they have not been clearly identified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Multi-factor authentication

A

Identity proven by presenting more than one item for proof credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Malware

A

Seeks to compromise a computing system without permission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Methods of infection

A

Viruses
Worms
Trojand

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Viruses

A

Programs that infect software OR file

Require executable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Worms

A

Automatically spread

Do not require an executable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Trojans

A

Masquerading as something else

Leading user to download and install

18
Q

Goals of malware

A
Botnets or zombie networks
Malicious adware
Spyware
Keylogger
Screen capture
Card skimmer
RAM scraping
Ransomware
Blended threats
19
Q

Malicious adware

A

programs installed without consent and later serve unwanted ads

20
Q

Spyware

A

Software that monitors the users actions, networks traffic, or scans for files

21
Q

Keylogger

A

records user keystrokes

22
Q

Screen capturer

A

Captures the pixels

23
Q

Card skimmer

A

Captures the data from a swipe cards magnetic strip

24
Q

RAM scraping

A

Malicious code that scans computing memory for sensitive data

25
Q

Ransomware

A

Encrypts users file and demands payment

26
Q

Blended threats

A

Combination multiple hacking exploits

27
Q

Push-button hacking

A

Hacking toolkits bought online

Hackers can just push button to launch attack

28
Q

Dumpster driving

A

Go through trash to find valuable data and insights to launch attack

29
Q

Shoulder surfing

A

Gaining info through observation

30
Q

Brute-force attack

A

Trying all possible password combinations in order to break in

31
Q

Virtual private network (VPN)

A

scrambles data passed across network

32
Q

Open-source software

A

Allows firms to use free, reliable software

Vulnerabilities in open-source software

33
Q

Taking action as a user

A

1.Surfing smart: Think before you klick
2.Staying vigilant
3.Stay updated: Turn on software update features
4 Stay armed: Install a full suite of security software
5 Be setting smart: Encrypt hard drives
6 Be password savvy: Change the default password and update regularly
7 Be disposal smart: Shred personal docs and destroy media with sensitive info
8 Back up: Avoid loss after hardware failure
9 Check with your administrator

34
Q

International Organisation Standards

A

Provides several frameworks for implementing, operating, monitoring, reviewing, maintaining and improving Information Security Management Systems

35
Q

Potential losses

A
Theft
System manages
Data loss
Disclosure of proprietary info
Recovery
Downtime
Stock price decline
Legal fees
Penalties
Damages of reputation
36
Q

Firewalls

A

Used to examine traffic as it enters and leaves the network

Blocks certain types of access

37
Q

Intrusion detection system

A

Look for unauthorised behaviour
Sounding alarm
Take action

38
Q

Honeypots

A

Tempting to draw hacking attempts

39
Q

Blacklist

A

Deny the entry of specific IP dresses, products, Internet domains and other communication restriction for bad guys

40
Q

Whitelist

A

More restrictive

Only permit communication with approved entities or in an approved manner

41
Q

Information security

A

Complex
Constantly changing
Critical important