IS4670 CHAPTER 8 TERMS & DEFINITIONS Flashcards
1
Q
- A step-by-step procedure that a computer follows to solve a problem.
A
Algorithm
2
Q
– In Microsoft’s NTFS (NT File System), metadata associated with a file system object.
A
Alternate data streams (ADS)
3
Q
- A difficult-to-detect way to bypass normal authentication, gain remote access to a computer, obtain access to plaintext, and so on. A rootkit may install this to enable an attacker to access the system, regardless of changes to system accounts or other access control techniques.
A
Backdoor
4
Q
- The data that is used to hide secret data in steganography. Today, multimedia files, such as pictures or sound, are most commonly used as carrier messages to hide secret data. This is also called a cover file or carrier message.
A
Carrier file
5
Q
- A technique for passing information between computers on a network, without being detected by a firewall or an intrusion detection system. Packet crafting and protocol bending are two of these techniques.
A
Covert channel
6
Q
- A technique that allows the addition of copyright notices or other verification messages to digital audio, video, or image signals and documents.
A
Digital watermarking
7
Q
- In steganography, the data that is to be kept a secret.
A
Embedded file
8
Q
- In steganography, the process of hiding data. Also known as running the steganography algorithm.
A
Embedding
9
Q
- In steganography, the recovery of an embedded message.
A
Extraction
10
Q
- The process of collecting data about a specific network environment, usually for the purpose of finding ways to attack the target.
A
Footprinting
11
Q
- A theory which states that a system will be secure even if everything about it except the key is public knowledge.
A
Kerckhoffs’ principle
12
Q
- A type of rootkit that installs itself into the application programming interface (API). The rootkit then intercepts system calls by acting as a “man in the middle,” deciding what information and programs the user does and does not see.
A
Kernel module rootkit
13
Q
- Data about data. In a computer file, metadata provides information about a file. This information includes the means of creation, the purpose of the data, the time and date of creation, the creator or author of data, where the data was created, and what standards were used.
A
Metadata
14
Q
- A covert channel technique that involves embedding data in packet headers.
A
Packet crafting
15
Q
- To defeat copy protection in order to copy software or other files.
A
Pirate