IS4670 CHAPTER 8 TERMS & DEFINITIONS Flashcards

1
Q
  • A step-by-step procedure that a computer follows to solve a problem.
A

Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

– In Microsoft’s NTFS (NT File System), metadata associated with a file system object.

A

Alternate data streams (ADS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  • A difficult-to-detect way to bypass normal authentication, gain remote access to a computer, obtain access to plaintext, and so on. A rootkit may install this to enable an attacker to access the system, regardless of changes to system accounts or other access control techniques.
A

Backdoor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  • The data that is used to hide secret data in steganography. Today, multimedia files, such as pictures or sound, are most commonly used as carrier messages to hide secret data. This is also called a cover file or carrier message.
A

Carrier file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  • A technique for passing information between computers on a network, without being detected by a firewall or an intrusion detection system. Packet crafting and protocol bending are two of these techniques.
A

Covert channel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  • A technique that allows the addition of copyright notices or other verification messages to digital audio, video, or image signals and documents.
A

Digital watermarking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  • In steganography, the data that is to be kept a secret.
A

Embedded file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  • In steganography, the process of hiding data. Also known as running the steganography algorithm.
A

Embedding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  • In steganography, the recovery of an embedded message.
A

Extraction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  • The process of collecting data about a specific network environment, usually for the purpose of finding ways to attack the target.
A

Footprinting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  • A theory which states that a system will be secure even if everything about it except the key is public knowledge.
A

Kerckhoffs’ principle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  • A type of rootkit that installs itself into the application programming interface (API). The rootkit then intercepts system calls by acting as a “man in the middle,” deciding what information and programs the user does and does not see.
A

Kernel module rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  • Data about data. In a computer file, metadata provides information about a file. This information includes the means of creation, the purpose of the data, the time and date of creation, the creator or author of data, where the data was created, and what standards were used.
A

Metadata

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  • A covert channel technique that involves embedding data in packet headers.
A

Packet crafting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  • To defeat copy protection in order to copy software or other files.
A

Pirate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  • A covert channel technique that involves the use of a network protocol for some unintended purpose.
A

Protocol bending

17
Q
  • A form of steganography in which the sender and receiver share a secret key, called the stego key. Only a possessor of the stego key can detect the presence of an embedded message.
A

Public key steganography (PKS)

18
Q
  • A program or a combination of several programs designed to hide or obscure the fact that a system has been compromised
A

Rootkit

19
Q
  • A principle that attempts to provide security through the use of secrecy of design, implementation, and so on. A system that relies on this type of security may have security vulnerabilities, but its owners or designers believe that the flaws are not known, and that attackers are unlikely to find them.
A

Security through obscurity

20
Q
  • A form of steganography that is based on keeping the method for embedding a secret.
A

Simple steganography

21
Q
  • The process of detecting messages hidden using steganography. In other words, steganalysis is about separating cover messages from stego messages.
A

Steganalysis

22
Q
  • Tools that can detect the presence of steganography
A

Steganalysis software

23
Q
  • The process of hiding secret data within non-secret data.
A

Steganography

24
Q
  • In secret key steganography, this is the secret key that the sender and receiver share. Only a possessor of this key can detect the presence of an embedded message.
A

Stego key

25
Q

-In steganography, the message that results from the embedding process.

A

Stego message