Security Basics Flashcards
Define Authorized Users.
People who are meant to have access to a certain system
Define Hackers.
People who attempt to gain access to a computer system in a way not intended by the system’s owner.
Define Malware.
Malicious software created or used by hackers that does something the owner of the system does not want.
Define Severtiy.
The seriousness of a crime from the perspective of the victim and from the perspective of the law.
Define Secure Systems.
Systems that are secure against known threats and potential ones (to an extent).
What are White Hat Hackers?
Security professionals brought in and paid specifically to test the security of a system.
What are Black Hat Hackers?
People who gain access to a system without permission and steal/alter data. Not always for personal profit, sometimes it is an act of civil disobedience.
What are grey hat hackers?
People who gain access to a system without permission but with no malicious intent. Often used to inform a company about vulnerabilities of their system.
How is severity judged?
It is judged by the stemming from the connection to further crimes. The act itself is not the only thing looked at, it is the intentions of the hacker, and how accessing a system could cause further crimes in the future.
Define Computer Viruses.
Unwanted, self-replication embedded code with a debilitation effect on a computer system. Different to ‘bugs’ which are unintended errors. Come in a variety of different flavours. Virus detection relies on recognizing the code in viruses.
Define Trojan horse.
Software that masquerades as something else that does something malicious when executed. Typically delivered in downloadable files from websites or emails.
Define worms.
A network propagated virus, meaning it spreads system, to system.
Define Zombies.
A software program that is used to control your computer remotely without your knowledge.
Define key loggers.
Software that sits on the computer and logs the keys you press. It can also come in the form of hardware, for example inserting a USB into the back of a computer and then using the USB to see the stream f inputs a user has entered.
Define rootkits.
Hides software’s presence from a user by gaining root access toa system. When a computing system (OS) software is running, rootkit lies and hides the software. Can only be removed by re-installing the OS unless you know where the root kit is, or the type involved.
Define BIOS rootkits.
The evolution of rootkits. Can only be removed by reformatting the BIOS.
What are passwords?
Passwords authenticate you as an authorized user based on a shared secret between you and the system. We know it is each other as we know the shared secret
How are passwords stored?
Passwords are stored in a single, hashed, and slated file typically called a password file. Every website has a file like this as does your computer. Access to this file should be strictly controlled and not even the company should be able to see it.