Lesson 1 Flashcards

1
Q

What is information security?

A

Information security refers to the policies, procedures, and technical measures that can be applied to prevent unauthorised use, modication and theft to computer based resources, such as hardware, software and data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why is information security important?

A

In today’s high technology environment, organisations are becoming more and more dependent on their information systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the three basic information security concepts?

A

1) Confidentiality
2) Integrity
3) Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You visit an organisation’s website and you realised that you are able to view sensitive files on their web server. Even though it is not your fault, it is still considered an information security breach.

A. True
B. False

A

A. True

Since you were not allowed to access sensitive files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Verifying that users are who they say they are and that each input arriving at the system came from a trusted source.

A. Authenticity
B. Integrity
C. Confidentiality
D. None of the above

A

A. Authenticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

List the three stages in plan-protect-respond cycle

A

Planning, protection and response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In plan, protect and response cycle, which stage consumes the most time?

A

Protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How is protection defined?

A

Protection is defined as the plan-based creation of operation and countermeasures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How is response defined?

A

Response is defined as recovery according to plan.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why is there a need to understand Threat Environment?

A

To know how the attacks are going to attack us, and thus how to defend our systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The changing nature of information security attacks is more common than the traditional attacks.

A. True
B. False

A

A. True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Automation, speed and action at distance are encouraging online attacks

A. True
B. False

A

A. True

The chances of getting punished is low as well.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Most obvious reason(s) for computer security attacks is (are):

A

Privacy violations,
Criminal attacks,
Publicity attacks,
Legal attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The fabrication of information that is purported to be from someone who is not actually the author is called:

A

Masquerading

(taking someone else’s identity)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The interruption or degradation of a data service or information access is called

Could be due to traffic of any other reason

A

Denial of service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Malware is a generic term for “evil/malicious software”

A. True
B. False

A

A. True

17
Q

Distinguish between viruses and worms.

A

Virus needs a host program while worms are full programs and don’t need a host program. Both differ in the way they come to the target.

Similarities: Both can cause malicious damage and can be detected by antivirus programs.

18
Q

How do most viruses spread between computers today?

A

Mostly via email messages, but also through thumb drives, file sharing programs, downloading infected programs from a malicious website, social networking sites.

Most mobile applications have been scanned and verified, only some are infected

19
Q

What is a virus or worm payload?

A

Payloads are pieces of code that causes damage

Could be delete, steal, spy, make the system unstable, etc.

20
Q

What is a Logic Bomb?

A

Malicious codes that execute when certain predefined events occur.

21
Q

What are the likely motivations for hackers

A. Financial gain, publicity, espionage
B. They are too smart and want people to know about it
C. They do it for a challenge
D. They do it as they are bored
E. All of the above

A

E. All of the above

A) is the most common reason
B) This was part of the motivations in the early hacking era, however today there are more compelling reasons.
C & D) could be some of the reasons, but not the most common reason

22
Q

What is the definition of hacking?

A

Hacking is intentionally accessing a computer resource without authorisation or in excess of authorisation.

Excess of authorisation - when you have authorisation that you’re not supposed to have

23
Q

What is spyware?

A

Spyware refers to a broad spectrum of Trojan horse programs that gather information about you and make it available to an attacker.

Spyware is different from adware and malicious software. Spyware’s purpose is to gather information about someone.

24
Q

Why can cookies be dangerous?

A

Cookies can record too much sensitive information about you and could become spyware.

Cookies are legal, and that’s what makes them dangerous

25
Q

What is social engineering?

A

Social engineering attacks take advantage of flawed human judgement by convincing the victim to take actions that are counter to security policies.

26
Q

What is spam?

A

Spam is unsolicited, unwanted, commercial e-mail.

27
Q

What is phishing?

A

Phishing attack victims receive an email message that appears to come from a bank or another firm with which the victim does business with, but is not. Purpose of phishing is to trick people by misleading them.

28
Q

How can social engineering be used to get access to a sensitive file?

A

Simply by asking someone to send the file or to give access to the file by tricking the user.