module 5 Flashcards

1
Q

how much will cybercrime cost the world economy by 2025

A

$10.5 trillion annually

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

costs of cyber crime

A

loss of revenue
stolen identities, intellectual property and trade secrets
damage to companies and individuals reputations
expense of enhancing and upgrading a compnays cyver security
loss of business info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

spyware

A

software gathers info about users while connected to the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

adware

A

form of spyware that collects info about the user to determine ads to display

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

phishing

A

sending fradulent emails that seem to come from legit sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

pharming

A

like phising but the official website of an org is hijacked by altering website IP address via a domain name system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

baiting

A

similar to phishing attacks but baiter gives recipient a promise (free software/giftcard)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

quid pro quo

A

Similar to baiting but involves a hacker requesting the exchange of critical data or login information in exchange for a service or prize

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SMSishing

A

technique that tricks user to download malware onto mobile devicei

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

vishing

A

using voice technology that tricks user into revealing important financial or personal info to unauthorized entities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

keystroke loggers

A

software or hardware devices that monitor and record keystrokes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

sniffing

A

capture and record network traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

spoofing

A

attempt to gain access to a network by posing as an authorized user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

computer fraud

A

unauthorized use of computer data for personal gain

denial of service attacks
identity theft
software piracy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

viruses

A

self propagating program code that is triggered by a specified time or event

attaches to other files continuously
transmitted through the network, email or mssg boards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

worms

A

indept programs that can spread without attaching a host programs

eats up computer resources
does not usually erase data

17
Q

trojan programs

A

contain code intended to disrupt a computer, network or website

hidden inside popular program
can erase data
do not replicate

18
Q

logic bombs

A

type of trojan program used to release a virus, worm, or other destructive code

triggered at certain tiem or event

19
Q

backdoors (or trapdoor)

A

programming routine built into a system

enables the designer or programmer to bypass security at a later time

20
Q

blended threats

A

combines characteristics of viruses, worms and malicious codes with vulnerabilities on networks

embedding malicious codes in the servers HTML files
sending unauthorized emails from compromised servers with a worm attachment

21
Q

rootkits

A

series of software tools that enable unauthorized access to computer or network system

22
Q

denial of service attack (DOS)

A

flood a network or server with service requests to prevent legitimate users access to the system

23
Q

distributed denial of service (DDoS)

A

thousands of computers work together to floor a website to cause it to fail

24
Q

botnet

A

network of computers and IoT devices infected with malicious software and controlled as a group

25
Q

TDOS telephone DOS

A

high volumes of automated calls flood a target phone system, halting incoming and outgoing calls

26
Q

social engineering

A

using people skills to trick others into revealing private ingo

27
Q

comprehensive securirty system should have

A

acess controls
data encryptions

28
Q

biometric security measures

A

physiological element unique to a person that cannot be stolen, lost, copied or passed on to others.

29
Q

thee main nonbiometric secuirty measures

A

callback modems
firewalls
intrusion detection systems

30
Q

intrusion detection system

A

protects external and internal access

placed in front of a firewall
identifies attack signatures, traces pattersn and generates alarms

31
Q

data encryption

A

transforms plaintext data into a scrambled form called ciphertext that cannot be read by others

SSL
TLS

32
Q
A