IT: Chapter 7: Securing Information Systems Flashcards
Security
refers to the policies, procedures, and technical measures used to prevent unauthorized access, alternation, theft, or physical damage to information systems
Controls
methods, policies, and organizational procedures that ensure the safety of the organization’s assets, the accuracy and reliability of its records, and operational adherences to management standards
SSIDs (Service set identifiers)
identify the access points in a Wi-Fi network are broadcast multiple times and can be picked up fairly easily by intruders’ sniffer programs
War Driving
eavesdroppers drive by buildings or park outside and try to intercept wireless network traffic
Rogue Access points
To force a user’s radio network interface controller to associate with the rogue access point.
Malware
malicious software programs include a variety of threats, such as viruses, works, and Trojan horses
Virus
rogue software program that attaches itself to other software programs or data files in order to be executed
Worms
independent computer programs that copy themselves from one computer to other computers over a network
Trojan Horses
software program that appears to be benign but then does something other than expected
SQL injection attacks
take advantage of vulnerabilities in poorly coded Web application software to introduce malicious program code into a company’s systems and networks
Spyware
small programs install themselves surreptitiously on computers to monitor user Web surfing activity and server up advertising
Key loggers
record every keystroke on computer to steal serial numbers, passwords, launch internet attack
Hacker
an individual who intends to gain unauthorized access to a computer system
Cracker
typically used to denote a hacker with criminal intent
Cybervandalism
the intentional disruption, defacement, or even destruction of a Web site or corporate information systems
Spoofing
misrepresenting oneself by using fake e-mail addresses or masquerading as someone else
Sniffer
eavesdropping program that monitors information traveling over network
Denial-of-service attacks (DoS)
flooding server with thousands of false requests to crash the network
Distributed Denial-of-service attacks ((DDoS)
uses numerous computers to inundate and overwhelm the network from numerous launch points
Botnets
networks of “zombies” PCs infiltrated by bot malware
Computer Crime
any violations of criminal law that involve a knowledge of computer technology for their perpetration, investigation, or prosecution
Identity theft
an imposter obtains key pieces of personal information (social security ID, driver’s license, or credit card numbers) to impersonate someone else
Phishing
setting up fake Web sites or sending e-mail messages that look like legitimate businesses to ask users for confidential personal data
Evil Twins
wireless networks that pretend to offer trustworthy Wi-Fi connections to the internet
Pharming
redirects users to a bogus Web page even when individual types correct Web page address to his or her browser
Click fraud
an individual or a computer program fraudulently clicks on an online ad without any intention of learning more about the advertiser
Cyberware
state-sponsored activity designed to cripple and defeat another state or nation by penetrating its computers or networks for the purposes of causing damage and disruption
Social engineering
tricking employees into revealing their passwords by pretending to be legitimate members of the company in need of information
hidden bugs
program code defects