Information Security Flashcards

1
Q

Motivation of bad guys

A
Account theft and illegal funds transfer
Stealing personal OR financial data
Compromising computing or financial data
Extortion
Intellectual property theft
Espionage
Cyberwarfare
Terrorism
Pranksters
Hacktivism
Revenge
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data harvesters

A

infiltrate systems and collect data for illegal resale

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cash-out fraudsters

A

purchase data from data harvester and use stollen credit card data for illegal actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Botnets OR zombie computers

A

Networks infiltrated and compromised machines controlled by central command and used for nefarious activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Hacktivists

A

protesters seeking to make political point by leveraging tech tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

White hat hacker

A

Good guys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Black hat hacker

A

Bad guys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Social engineering

A

Tricking employees into revealing info without computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Phishing

A

Tricking someone to install malicious software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

spoofed email adress

A

altered to seem as if it came from another source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Zero-day exploits

A

Attacks that are so new they have not been clearly identified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Multi-factor authentication

A

Identity proven by presenting more than one item for proof credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Malware

A

Seeks to compromise a computing system without permission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Methods of infection

A

Viruses
Worms
Trojand

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Viruses

A

Programs that infect software OR file

Require executable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Worms

A

Automatically spread

Do not require an executable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Trojans

A

Masquerading as something else

Leading user to download and install

18
Q

Goals of malware

A
Botnets or zombie networks
Malicious adware
Spyware
Keylogger
Screen capture
Card skimmer
RAM scraping
Ransomware
Blended threats
19
Q

Malicious adware

A

programs installed without consent and later serve unwanted ads

20
Q

Spyware

A

Software that monitors the users actions, networks traffic, or scans for files

21
Q

Keylogger

A

records user keystrokes

22
Q

Screen capturer

A

Captures the pixels

23
Q

Card skimmer

A

Captures the data from a swipe cards magnetic strip

24
Q

RAM scraping

A

Malicious code that scans computing memory for sensitive data

25
Ransomware
Encrypts users file and demands payment
26
Blended threats
Combination multiple hacking exploits
27
Push-button hacking
Hacking toolkits bought online | Hackers can just push button to launch attack
28
Dumpster driving
Go through trash to find valuable data and insights to launch attack
29
Shoulder surfing
Gaining info through observation
30
Brute-force attack
Trying all possible password combinations in order to break in
31
Virtual private network (VPN)
scrambles data passed across network
32
Open-source software
Allows firms to use free, reliable software | Vulnerabilities in open-source software
33
Taking action as a user
1.Surfing smart: Think before you klick 2.Staying vigilant 3.Stay updated: Turn on software update features 4 Stay armed: Install a full suite of security software 5 Be setting smart: Encrypt hard drives 6 Be password savvy: Change the default password and update regularly 7 Be disposal smart: Shred personal docs and destroy media with sensitive info 8 Back up: Avoid loss after hardware failure 9 Check with your administrator
34
International Organisation Standards
Provides several frameworks for implementing, operating, monitoring, reviewing, maintaining and improving Information Security Management Systems
35
Potential losses
``` Theft System manages Data loss Disclosure of proprietary info Recovery Downtime Stock price decline Legal fees Penalties Damages of reputation ```
36
Firewalls
Used to examine traffic as it enters and leaves the network | Blocks certain types of access
37
Intrusion detection system
Look for unauthorised behaviour Sounding alarm Take action
38
Honeypots
Tempting to draw hacking attempts
39
Blacklist
Deny the entry of specific IP dresses, products, Internet domains and other communication restriction for bad guys
40
Whitelist
More restrictive | Only permit communication with approved entities or in an approved manner
41
Information security
Complex Constantly changing Critical important