IS4670 CHAPTER 8 TERMS & DEFINITIONS Flashcards
1
Q
- A step-by-step procedure that a computer follows to solve a problem.
A
Algorithm
2
Q
– In Microsoft’s NTFS (NT File System), metadata associated with a file system object.
A
Alternate data streams (ADS)
3
Q
- A difficult-to-detect way to bypass normal authentication, gain remote access to a computer, obtain access to plaintext, and so on. A rootkit may install this to enable an attacker to access the system, regardless of changes to system accounts or other access control techniques.
A
Backdoor
4
Q
- The data that is used to hide secret data in steganography. Today, multimedia files, such as pictures or sound, are most commonly used as carrier messages to hide secret data. This is also called a cover file or carrier message.
A
Carrier file
5
Q
- A technique for passing information between computers on a network, without being detected by a firewall or an intrusion detection system. Packet crafting and protocol bending are two of these techniques.
A
Covert channel
6
Q
- A technique that allows the addition of copyright notices or other verification messages to digital audio, video, or image signals and documents.
A
Digital watermarking
7
Q
- In steganography, the data that is to be kept a secret.
A
Embedded file
8
Q
- In steganography, the process of hiding data. Also known as running the steganography algorithm.
A
Embedding
9
Q
- In steganography, the recovery of an embedded message.
A
Extraction
10
Q
- The process of collecting data about a specific network environment, usually for the purpose of finding ways to attack the target.
A
Footprinting
11
Q
- A theory which states that a system will be secure even if everything about it except the key is public knowledge.
A
Kerckhoffs’ principle
12
Q
- A type of rootkit that installs itself into the application programming interface (API). The rootkit then intercepts system calls by acting as a “man in the middle,” deciding what information and programs the user does and does not see.
A
Kernel module rootkit
13
Q
- Data about data. In a computer file, metadata provides information about a file. This information includes the means of creation, the purpose of the data, the time and date of creation, the creator or author of data, where the data was created, and what standards were used.
A
Metadata
14
Q
- A covert channel technique that involves embedding data in packet headers.
A
Packet crafting
15
Q
- To defeat copy protection in order to copy software or other files.
A
Pirate
16
Q
- A covert channel technique that involves the use of a network protocol for some unintended purpose.
A
Protocol bending
17
Q
- A form of steganography in which the sender and receiver share a secret key, called the stego key. Only a possessor of the stego key can detect the presence of an embedded message.
A
Public key steganography (PKS)
18
Q
- A program or a combination of several programs designed to hide or obscure the fact that a system has been compromised
A
Rootkit
19
Q
- A principle that attempts to provide security through the use of secrecy of design, implementation, and so on. A system that relies on this type of security may have security vulnerabilities, but its owners or designers believe that the flaws are not known, and that attackers are unlikely to find them.
A
Security through obscurity
20
Q
- A form of steganography that is based on keeping the method for embedding a secret.
A
Simple steganography
21
Q
- The process of detecting messages hidden using steganography. In other words, steganalysis is about separating cover messages from stego messages.
A
Steganalysis
22
Q
- Tools that can detect the presence of steganography
A
Steganalysis software
23
Q
- The process of hiding secret data within non-secret data.
A
Steganography
24
Q
- In secret key steganography, this is the secret key that the sender and receiver share. Only a possessor of this key can detect the presence of an embedded message.
A
Stego key
25
Q
-In steganography, the message that results from the embedding process.
A
Stego message