IS4560 T&D CHAPTER 1 Flashcards
1
Q
- Something of value that needs to be protected. In the IT realm, this can be data, software, or hardware.
A
Asset
2
Q
- The process of confirming that someone is who he or she claims to be, as with a username and password.
A
Authentication
3
Q
- A kind of testing of a computer system in which the testing team must approach it like a “black box,” with no prior knowledge of it.
A
Black-box testing
4
Q
- Someone who breaks into computer systems without authorization.
A
Cracker
5
Q
- Attacks in which a service is overwhelmed by traffic preventing or denying its legitimate use.
A
Denial of service (DoS)
6
Q
- A DoS attack launched simultaneously from large numbers of hosts that have been compromised and act after receiving a particular command.
A
Distributed denial of service (DDoS)
7
Q
- Gathering material that has been discarded or left in unsecured receptacles, such as trashcans or dumpsters.
A
Dumpster diving
8
Q
- Someone who knows how hacking works and understands the dangers its poses but uses those skills for good purposes; also known as a “white-hat hacker.”
A
Ethical hacker
9
Q
- A piece of software, data, or other similar item that can take advantage of a vulnerability or weakness inherent in a system.
A
Exploit
10
Q
- Originally this term referred to the technology enthusiasts of the 1960s—those who today would be known as “geeks.” Nowadays it’s widely used to refer to pranksters and criminals.
A
Hacker
11
Q
- A software or hardware device that is designed to detect suspicious or anomalous behavior and report it to the system owner or administrator.
A
Intrusion detection system (IDS)
12
Q
- A system that intercepts potentially hostile activity prior to it being processed.
A
Intrusion prevention system (IPS)
13
Q
- A piece of code designed to cause harm, intentionally inserted into a software system to be activated by some predetermined trigger.
A
Logic bomb
14
Q
- A specific type of malware designed to hide on a system and open up backdoors through which an attacker can gain access, control, or other insight into a system.
A
Trojan horse
15
Q
- The absence or weakness of a safeguard in an asset.
A
Vulnerability