Security - Chapter 17 Flashcards

1
Q

A system that monitors network use for potential hacking attempts. Such a system may take preventative action to block, isolate, or identify attempted infiltration, and raise further alarms to warn security personnel.

A

Intrusion detection systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An attack where a firm’s computer systems are flooded with thousands of seemingly legitimate requests, the sheer volume of which will slow or shut down the site’s use. These attacks are often performed via botnets.

A

distributed denial of service (DDoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A seemingly tempting, but bogus target meant to draw hacking attempts. By monitoring infiltration attempts against a these, organizations may gain insight into the identity of hackers and their techniques, and they can share this with partners and law enforcement.

A

honeypots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A two key system used for securing electronic transmissions. One key distributed publicly is used to encrypt (lock) data, but it cannot unlock data. Unlocking can only be performed with the private key. The private key also cannot be reverse engineered from the public key. By distributing public keys, but keeping the private key, Internet services can ensure transmissions to their site are secure.

A

public key encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A term that may, depending on the context, refer to either 1) breaking into a computer system, or 2) a particularly clever solution.

A

hack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Those scrambled character images that many sites require to submit some sort of entry (account setup, ticket buying) and are meant to be a Turing Test—a test to distinguish if a task is being performed by a computer or a human.

A

CAPTCHAs

An acronym for Completely Automated Public Turing Test to Tell Computers and Humans Apart

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A term that, depending on the context, may be applied to either 1) someone who breaks into computer systems, or 2) to a particularly clever programmer.

A

hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Criminals that purchase assets from data harvesters to be used for illegal financial gain. Actions may include using stolen credit card numbers to purchase goods, creating fake accounts via identity fraud, and more.

A

cash-out fraudsters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Scrambling data using a code or formula, known as a cipher, such that it is hidden from those who do not have the unlocking key.

A

encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Attacks that are so new that they haven’t been clearly identified, and so they haven’t made it into security screening systems.

A

zero-day exploits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Highly restrictive programs that permit communication only with approved entities and/or in an approved manner.

A

whitelists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Programs that deny the entry or exit of specific IP addresses, products, Internet domains, and other communication restrictions.

A

blacklists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A trusted third party that provides authentication services in public key encryption schemes.

A

certificate authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A con executed using technology, typically targeted at acquiring sensitive information or tricking someone into installing malicious software.

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Term used in security to refer to forging or disguising the origin or identity. E-mail transmissions and packets that have been altered to seem as if they came from another source are referred to as this.

A

spoofed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An attack that exhausts all possible password combinations in order to break into an account. The larger and more complicated a password or key, the longer this type of attack will take.

A

brute-force attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Someone who uncovers computer weaknesses without exploiting them. Their goal is to improve system security.

A

white hat hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Code that unlocks encryption.

A

key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

When identity is proven by presenting more than one item for proof of credentials. Multiple factors often include a password and some other identifier such as a unique code sent via e-mail or mobile phone text, a biometric reading (e.g. fingerprint or iris scan), a swipe or tap card, or other form if identification

A

multi-factor authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A protester seeking to make a political point by leveraging technology tools, often through system infiltration, defacement, or damage.

A

hacktivists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

black hat hackers

A

A computer criminal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Hordes of surreptitiously infiltrated computers, linked and controlled remotely, also known as zombie networks.

A

Botnets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Combing through trash to identify valuable assets.

A

dumpster diving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A system that acts as a control for network traffic, blocking unauthorized traffic while permitting acceptable use.

A

firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Technologies that measure and analyze human body characteristics for identification or authentication. These might include fingerprint readers, retina scanners, voice and face recognition, and more.

A

Biometrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Gaining compromising information through observation (as in looking over someone’s shoulder).

A

shoulder surfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Cybercriminals who infiltrate systems and collect data for illegal resale.

A

data harvesters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

honeypots

A

A seemingly tempting, but bogus target meant to draw hacking attempts. By monitoring infiltration attempts against a honeypot, organizations may gain insight into the identity of hackers and their techniques, and they can share this with partners and law enforcement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Intrusion detection systems

A

A system that monitors network use for potential hacking attempts. Such a system may take preventative action to block, isolate, or identify attempted infiltration, and raise further alarms to warn security personnel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

distributed denial of service (DDoS)

A

An attack where a firm’s computer systems are flooded with thousands of seemingly legitimate requests, the sheer volume of which will slow or shut down the site’s use. DDoS attacks are often performed via botnets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

con games that trick employees into revealing information or performing other tasks that compromise a firm are known as

A

social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Firms use information for what two purposes

A

Transactional purposes

Analytical purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Transactional purposes firms use information for

A

Day-to-day operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Analytical purposes firms use information for

A

Trend analyses, forecasts, and input generation for strategies that improve profit or long-term sustainability - compete on analytics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Major purpose of a database

A

To keep track of related information about more than one thing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

public key encryption

A

A two key system used for securing electronic transmissions. One key distributed publicly is used to encrypt (lock) data, but it cannot unlock data. Unlocking can only be performed with the private key. The private key also cannot be reverse engineered from the public key. By distributing public keys, but keeping the private key, Internet services can ensure transmissions to their site are secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

DBMS

A

Database Management Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

The set of defenses put in place to counter threats to technology infrastructure and data resources

A

Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

The process of identifying and measuring information systems security risks, and devising the optimal risk mitigation strategy

A

IT Risk Managment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

social engineering

A

con games that trick employees into revealing information or performing other tasks that compromise a firm are known as

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What is the CIA triad?

A

Confidentiality - integrity - availability

Fundamental conflict in security; balancing the three

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

If data cannot be seen by unauthorized people, its

A

Confidential

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Involves ensuring the consistency, accuracy, and trustworthiness of data - data cannot be changed in transit and/or by unauthorized people

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

If data can be accessed by people who should have access to it, it is appropriately ______.

A

Available

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Why is it sometimes difficult to make the business case for security measures?

A

IT security risks are hard to assess in the absence of an attack
Security is a negative deliverable
Forward looking investment with hypothetical benefits
Recurring investment
IT departments have limited budgets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Integrity

A

Involves ensuring the consistency, accuracy, and trustworthiness of data - data cannot be changed in transit and/or by unauthorized people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Confidential

A

If data cannot be seen by unauthorized people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Security

A

The set of defenses put in place to counter threats to technology infrastructure and data resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Available

A

If data can be accessed by people who should have access to it

50
Q

If a firm stops investing in security and maintains the old defenses too long, then a harmful attack occurrence becomes a matter of when, rather than if

A

Recurring investment

51
Q

IT Risk Managment

A

The process of identifying and measuring information systems security risks, and devising the optimal risk mitigation strategy

52
Q

Designed to manage the trade-off between the degree of desired security and the investment necessary to achieve it

A

Cost/benefit analysis (CBA$

53
Q

Cost benefit analysis (CBA) - security

A

Designed to manage the trade off between the degree of desired security and the investment necessary to achieve it

54
Q

5 costly actions that a firm might need to engage in as a result of a data breach involving customer information

A
  1. Investigation and remediation associated with the exploited vulnerability
  2. Notification of the impacted consumers via mail
  3. Identity theft and credit monitoring
  4. Lost business
  5. Lawsuits
55
Q

Investigation and remediation associated with the exploited vulnerability

A

Figure out how data was stolen/compromised, and put in place safeguards/patches to prevent future exploits of the same vulnerability

56
Q

Lost business as a result of a data breach involving customer information

A

Disruptions in normal business if services are down or denied, credit card companies may refuse to provide credit card service, lost business due to defecting customers

57
Q

What are typical internal security threats

A

Careless, ignorant, or negligent behavior

Intentional malicious behavior

58
Q

3 ways to combat insider threats

A

User training, user activity/behavior monitoring, information security (formal) governance program

59
Q

Attacks that exploit a vulnerability that a developer did not have time to address and patch

A

Zero-day (zero-hour, day-zero) attacks

60
Q

Training (response to security threats)

A

Reduce ignorance and indifference

61
Q

User activity and behavior monitoring (response to security threats)

A

Check compliance with polices

Look for suspicious activities

62
Q

Formal governance program (response to security threats)

A

Onboarding and “deboarding” procedures
Password standards
Statement of behaviors that individual employees should follow in order to minimize security risks
Statement of user rights and responsibilities, and of legitimate uses of portable devices
Periodic audits

63
Q

Code designed into software programs to allow access to the application by circumventing password protection
In some cases, they are built in order to prevent high-level accounts such as admin accounts from being made inaccessible

A

Backdoors

64
Q

Lying to and deceiving legitimate users

Tricking them into divulging restricted information

A

Social engineering

65
Q

Automated social engineering scams
-exposing individuals to official-sounding spam appearing to be from known/respectable/legitimate institutions that asks people to confirm private data in an effort to capture that data

A

Phishing

66
Q

Phishing scams via SMS

A

Smishing

67
Q

What are some common external threats to security (10)

A
Bugs (flaws) in the code
Heartbleed bug
Zero-day (zero-hour, day-zero) attacks
SQL injection attack
Trojan
Spyware
Virus
Worm
Denial of service attack (DoS)
Ransomware
68
Q

Revealed on Apr 7, 2014 (been around for 2 years) discovered by Neel Mehta of Google Security
A fix was available at the time the bug was revealed
Vulnerability in OpenSSL - open source cryptographic software library forSSL/TLS encryption - provides security and privacy for communication over the internet
Vulnerable sites - Facebook, Yahoo, Pinterest, etc.

A

Heartbleed bug

69
Q

A program that

  • appears to provide useful functionality
  • delivers a hidden, malicious payload, after installation (which could include backdoors for remote access and control)
A

Trojan

70
Q

Smishing

A

Phishing scams via SMS

71
Q

Code injection technique used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field (such as a username or password login authentication fields) for execution (e.g. to dump the database contents to the attacker)

  • in essence, this arises because the fields available for user input allow SQL statements to pass through unsanitized and query the database directly
  • one of the most common application layer attack techniques
A

SQL Injection Attack

72
Q

Sometimes can cause modules to freeze or malfunction, potentially weakening defenses

  • in other cases, poorly implemented functions/modules/operations can create opportunities for exploits (e.g., exposure to SQL Injections, Heartbleed bug affecting OpenSSL)
  • November 2017. Apple raced to fix MacOS High Sierra but that made it possible to log in without a password and gain administrator rights
A

Bugs (flaws) in the code

73
Q

Social engineering

A

Lying to and deceiving legitimate users

Tricking them into divulging restricted information

73
Q

From the moment the software with the flaw was released until the patch is released (technically until users install the patch but some users may abandon a system that is known to be vulnerable once that is public information

A

“Zero day” vulnerability window

75
Q

Bugs (flaws) in the code

A

Sometimes can cause modules to freeze or malfunction, potentially weakening defenses

  • in other cases, poorly implemented functions/modules/operations can create opportunities for exploits (e.g., exposure to SQL Injections, Heartbleed bug affecting OpenSSL)
  • November 2017. Apple raced to fix MacOS High Sierra but that made it possible to log in without a password and gain administrator rights
76
Q

Phishing

A

Automated social engineering scams
-exposing individuals to official-sounding spam appearing to be from known/respectable/legitimate institutions that asks people to confirm private data in an effort to capture that data

77
Q

SQL Injection Attack

A

Code injection technique used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field (such as a username or password login authentication fields) for execution (e.g. to dump the database contents to the attacker)

  • in essence, this arises because the fields available for user input allow SQL statements to pass through unsanitized and query the database directly
  • one of the most common application layer attack techniques
78
Q

Backdoors

A

Code designed into software programs to allow access to the application by circumventing password protection
In some cases, they are built in order to prevent high-level accounts such as admin accounts from being made inaccessible

80
Q
  • (SQL Select)
A

Select everything (all fields) from Table

83
Q

Trojan

A

A program that

  • appears to provide useful functionality
  • delivers a hidden, malicious payload, after installation (which could include backdoors for remote access and control)
84
Q

SSL

A

Secure socket layer
A technology that was developed to make secure communication possible
-the https:// encryption

85
Q

About how many SQL injections attacks per day

A

Half a million

87
Q

“Zero-day” vulnerability window

A

From the moment the software with the flaw was released until the patch is released (technically until users install the patch but some users may abandon a system that is known to be vulnerable once that is public information

88
Q

Hidden software that
-monitors behavior, collects information, transfers information to a third party, performs unwanted operations
Diverts resources and often slows down the computer

A

Spyware

89
Q

Spyware

A

Hidden software that
-monitors behavior, collects information, transfers information to a third party, performs unwanted operations
Diverts resources and often slows down the computer

90
Q

Malicious code that spreads by attaching itself to (mostly executable) files that are part of legitimate installed programs
-usually needs human action to replicate and spread - running or copying the infected program/code (e.g., running an executable file, etc)

A

Virus

91
Q

Virus

A

Malicious code that spreads by attaching itself to (mostly executable) files that are part of legitimate installed programs
-usually needs human action to replicate and spread - running or copying the infected program/code (e.g., running an executable file, etc)

92
Q

Payload of a virus

A

Harmful set of actions performed after machine is infected
-damage may vary in severity from just some occasional pop-up messages to files being corrupted/deleted or entire systems being shut down

93
Q

Self-replicating malicious code that exploits security holes in network software to spread across nodes in a network

A

Worm

94
Q

Worm

A

Self-replicating malicious code that exploits security holes in network software to spread across nodes in a network

95
Q

Unlike viruses, worms…

A

Do not usually attach to a file
Are standalone software programs that may self-replicate/spread without a host program or human action (e.g., send a copy of itself to everyone in the users’ address book, replicate by exploiting network vulnerabilities)

96
Q

Worm that attacked web servers running IIS

  • installed back door and propagated 100 times over per infection
  • patch issued by Microsoft on June 18, 2001
  • worm struck on July 19, 2001 (a month after patch was made available)
A

Code Red

97
Q

Code Red

A

Worm that attacked web servers running IIS

  • installed back door and propagated 100 times over per infection
  • patch issued by Microsoft on June 18, 2001
  • worm struck on July 19, 2001 (a month after patch was made available)
98
Q

Digital assault carried out over a computer network
Objective: concerted effort (often times using botnets) to overwhelm an online service with requests and slow it down or force it to shut down altogether
-can be used to divert attention to allow the attacker to exploit other security vulnerabilities

A

Denial-of-Service Attack (DoS)

99
Q

Denial-of-Service Attack (DoS)

A

Digital assault carried out over a computer network
Objective: concerted effort (often times using botnets) to overwhelm an online service with requests and slow it down or force it to shut down altogether
-can be used to divert attention to allow the attacker to exploit other security vulnerabilities

100
Q

Type of malware that restricts access to the infected computer system in some way (inability to log in or encryption of files), and requests that the user pays a ransom for the restrictions to be removed

  • a lot of times in the form of a Trojan
  • sometimes used as a distraction from more serious hacking
A

Ransomware

101
Q

Ransomware

A

Type of malware that restricts access to the infected computer system in some way (inability to log in or encryption of files), and requests that the user pays a ransom for the restrictions to be removed

  • a lot of times in the form of a Trojan
  • sometimes used as a distraction from more serious hacking
102
Q

Two examples of ransomware

A
CryptoLocker Trojan (later versions evolving to worm) - encrypted files on the affected system - demand ransom in the form of bitcoins
Cryptowall (Windows), KeRanger (OS X)
103
Q

Web based attack platforms

  • buy, lease, subscribe, or pay-as-you-go
  • encrypted command and control channels
  • web services for hosting phishing context
  • browser engines designed for identity theft
  • drive scanners to capture sellable data (email addresses, credit card details)
  • typically used by low level criminals
A

Malware kits

104
Q

Use multiple tools to guard against intrusion (a key security practice)

A

Defense in depth

105
Q

The cornerstone of securing against intrusion is the

A

Use of passwords

106
Q

These can be used to screen and manage traffic in and out of a computer network

A

Firewalls

107
Q

This process scrambles content so that it is rendered unreadable

A

The encryption process

108
Q

What is the response that IT professionals use to respond to malware (malicious code)

A

IT professionals install detection software (antivirus, anti spyware, etc)

109
Q

Patch

A

Mitigation method

110
Q

Seeks to compromise a computing system without permission

A

Malware (for malicious software)

111
Q

Programs that infect other software or files. They require executable (a running program) to spread, attaching to other executables. They can spread via operating systems, programs, or the boot sector or auto-run Feature of media such as DVDs or USB drives. Some applications have executable languages (macros) that can also host these that run and spread when a file is open.

A

Viruses

112
Q

Programs that take advantage of security vulnerability to automatically spread, but unlike viruses, they do not require an executable. Some scan for and install themselves on vulnerable systems with stunning speed (in an extreme example, the SQL Slammer infected 90 percent of vulnerable software within just ten minutes

A

Worms

113
Q

Exploits that, like the mythical Trojan horse, try to sneak in by masquerading as something they’re not. The payload is released when the user is duped into downloading and installing the malware cargo, oftentimes via phishing exploits

A

Trojans

114
Q

Hordes of surreptitiously infected computers linked and controlled remotely by a central command

A

Botnets or zombie networks

115
Q

Used in crimes where controlling many difficult-to-identify PCs is useful, such as when perpetrating click fraud, sending spam, executing “dictionary” password cracking attempts, or launching denial-of-service attacks

A

Botnets or zombie networks

116
Q

Programs installed without full user consent or knowledge that later serve unwanted advertisements

A

Malicious adware

117
Q

Software that surreptitiously monitors user actions, network traffic, or scans for files

A

Spyware

118
Q

Type of spyware that records keystrokes. They can be either software based or hardware based, such as a recording “dongle” that is plugged in between a keyboard and a PC.

A

Keylogger

119
Q

Variant of the keylogger approach. This category of software records the pixels that appear on a users screen for later playback in hopes of identifying proprietary information

A

Screen capture

120
Q

A software program that secretly captures data from a swipe card’s magnetic strip

A

Card Skimmer

121
Q

Malicious code that scans computing memory (RAM, hard drives, or other storage) for sensitive data, often looking for patterns such as credit card or social security numbers

A

RAM scraping or storage scanning software

122
Q

Malware that encrypts a users files (perhaps threatening to delete them), with demands that a user up to regain control of their data and/or device

A

Ransomware

123
Q

Attacks combining multiple malware or hacking exploits

A

Blended threats

124
Q

This technique zeros in on a sloppy programming practice where software developers don’t validate user input

A

SQL injection technique

125
Q

Software updates that plug existing holes

A

Patches