Vulnerability of Information Systems Flashcards

1
Q

Antivirus Software

A

An antivirus program is a software program that scans files on the
network against known virus patterns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cloud Computing

A

Cloud computing refers to Internet-based computing, where
computers obtain infrastructure such as software and information
from common centers on demand.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CRM System

A

A customer-relationship management (CRM) system manages the
company’s client interactions, such as in sales, marketing, and
customer service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Data Mining and Visualization

System

A

A data mining and visualization system derives patterns from data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

E-Commerce System

A

An e-commerce system is used for buying and selling products or
providing services over the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ERP System

A

An enterprise resource planning (ERP) system supports and
integrates the various functions within the organization, including
planning, manufacturing, sales, marketing, and accounting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Firewall

A

A firewall is a piece of a hardware or software program that prevents
hackers, viruses, and worms from reaching a computer or network
on the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

MIS

A

A management information system (MIS) provides information

needed to effectively manage an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Proxy Server

A

A proxy server is an enhanced firewall that intercepts incoming and
outgoing traffic over the network. It also masks the true network
address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

RFID

A

Radio-frequency identification (RFID) technology involves the use of
tags that can be read using radio waves for the purpose of
identification of an object, person, or animal. RFID are small tags
that can be read by sensors and, as an example, can track products
at supermarkets and other places. They should not be confused with
universal product codes (UPCs), which are still the most popular
method of scanning and reading bar codes on most products at
checkout.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Transaction Processing

System

A

A transaction processing system manages the data transactions of
an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

DNS (Domain Name Service)

A

resolves domain names to IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

FTP (File Transfer Protocol)

A

transfers data over a network from one computer to another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

HTTP (Hypertext Transfer Protocol)

A

used for Web pages

HTTPS: HTTP using SSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

HTTPS

A

HTTP using SSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

IMAP (Internet Message Access Protocol)

A

an e-mail receiving protocol that maintains messages on a server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

LDAP (Lightweight Directory Access Protocol)

A

provides logon to network environments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

POP3 (Post Office Protocol Version 3)

A

an e-mail receiving protocol for MTA-to-UA transmissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

SMTP (Simple Mail Transfer Protocol)

A

an e-mail sending protocol for UA-to-MTA or MTA-to-MTA transmissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

SSL (Secure Sockets Layer)

A

a cryptographic protocol that provides secure communications on the Internet (there are hundreds of these protocols - this is an illustrative example).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Telnet

A

a protocol for virtual terminal-to-host network connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

TFTP (Trivial File Transfer Protocol)

A

a simple, basic file transfer protocol with limited functionalities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

X.500 Directory Service

A

the OSI directory service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

AES (Advanced Encryption Standard)

A

an NIST standard secret key encryption algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

ASN.1 (Abstract Syntax Notation One)

A

an ISO and ITU standard for describing abstract data structures for encoding and decoding data for transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

CDR (Common Data Representation)

A

a protocol used to represent data that is passed in CORBA object invocations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

ITU-T X.216/ISO 8822

A

the OSI presentation service definition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

ITU-T X.226/ISO 8823

A

the OSI connection-oriented presentation protocol specification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Java Serialization

A

a Java communication mechanism that saves and restores an object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Bot-network operators

A

Bot-network operators are hackers; however, instead of breaking into systems for the challenge or bragging rights, they take over multiple systems in order to coordinate attacks and to distribute phishing schemes, spam, and malware attacks. The services of these networks are sometimes made available in underground markets (e.g., purchasing a denial-of-service attack, servers to relay spam, or phishing attacks, etc.).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Criminal groups

A

Criminal groups seek to attack systems for monetary gain. Specifically, organized crime groups are using spam, phishing, and spyware/malware to commit identity theft and online fraud. International corporate spies and organized crime organizations also pose a threat to the United States through their ability to conduct industrial espionage and large-scale monetary theft and to hire or develop hacker talent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Foreign intelligence services

A

Foreign intelligence services use cyber tools as part of their information-gathering and espionage activities. In addition, several nations are aggressively working to develop information warfare doctrine, programs, and capabilities. Such capabilities enable a single entity to have a significant and serious impact by disrupting the supply, communications, and economic infrastructures that support military power - impacts that could affect the daily lives of U.S. citizens across the country.

33
Q

Hackers

A

Hackers break into networks for the thrill of the challenge or for bragging rights in the hacker community. While remote cracking once required a fair amount of skill or computer knowledge, hackers can now download attack scripts and protocols from the Internet and launch them against victim sites. Thus while attack tools have become more sophisticated, they have also become easier to use. According to the Central Intelligence Agency, the large majority of hackers do not have the requisite expertise to threaten difficult targets such as critical U.S. networks. Nevertheless, the worldwide population of hackers poses a relatively high threat of an isolated or brief disruption causing serious damage.

34
Q

Insiders

A

The disgruntled organization insider is a principal source of computer crime. Insiders may not need a great deal of knowledge about computer intrusions because their knowledge of a target system often allows them to gain unrestricted access to cause damage to the system or to steal system data. The insider threat also includes outsourcing vendors as well as employees who accidentally introduce malware into systems.

35
Q

Phishers

A

Individuals, or small groups, who execute phishing schemes in an attempt to steal identities or information for monetary gain. Phishers may also use spam and spyware/malware to accomplish their objectives.

36
Q

Spammers

A

Individuals or organizations who distribute unsolicited e-mail with hidden or false information in order to sell products, conduct phishing schemes, distribute spyware/malware, or attack organizations (i.e., denial of service).

37
Q

Spyware/malware authors

A

Individuals or organizations with malicious intent carry out attacks against users by producing and distributing spyware and malware. Several destructive computer viruses and worms have harmed files and hard drives, including the Melissa Macro Virus, the Explore.Zip worm, the CIH (Chernobyl) Virus, Nimda, Code Red, Slammer, and Blaster.

38
Q

Terrorists

A

Terrorists seek to destroy, incapacitate, or exploit critical infrastructures in order to threaten national security, cause mass casualties, weaken the U.S. economy, and damage public morale and confidence. Terrorists may use phishing schemes or spyware/malware in order to generate funds or gather sensitive information.

39
Q

NFS (Network File System)

A

accesses remote resources transparently and represents files and directories as if they were local to the user

40
Q

SAP (Session Announcement Protocol)

A

assists in the advertisement of a multicast session over multicast IP addresses

41
Q

SCP (Session Control Protocol)

A

designed for multiple sessions over a single TCP Connection

42
Q

SDP (Session Description Protocol)

A

describes streaming media initialization parameters, published by IETF as RFC 4566

43
Q

SQL (Structured Query Language)

A

functions as a query language that requests, updates, and manages databases

44
Q

SSH (Secure Shell)

A

a protocol used in Telnet sessions for remote login

45
Q

SSL (Secure Sockets Layer)

A

a cryptographic protocol that provides secure communications on the Internet (there are hundreds of these protocols

46
Q

SCTP(Stream Control Transmission Protocol)

A

a reliable, general-purpose protocol that provides stable, ordered message delivery

47
Q

TCP (Transmission Control Protocol)

A

provides a connection-oriented point-to-point connection between two hosts

48
Q

TLS (Transport Layer Security)

A

a successor to SSL for providing secured communications on the Internet

49
Q

UDP (User Datagram Protocol)

A

provides a connectionless communication, which broadcasts message to one or more hosts

50
Q

AH (Authentication Header)

A

a protocol that provides source authentication and data integrity

51
Q

CHAP (Challenge Handshake Authentication Protocol)

A

uses a three-way handshake to provide dial-up security

52
Q

ESP (Encapsulating Security Payload)

A

a protocol that provides privacy, source authentication, and data integrity

53
Q

ICMP (Internet Control Message Protocol)

A

used in handling errors and controlling traffic

54
Q

IP (Internet Protocol)

A

used to carry data in Microsoft and Internet networks

55
Q

IPSec (Internet Protocol Security)

A

a collection of protocols that provide security for Internet packets

56
Q

IPX (Internet Packet Exchange)

A

a protocol used to carry data in Novell networks

57
Q

ISAKMP (Internet Security Association and Key Management Protocol)

A

used to establish security associations and cryptographic keys

58
Q

OSPF (Open Shortest Path First)

A

a routing protocol based on the shortest path to the destination

59
Q

PAP (Password Authentication Protocol)

A

used to validate the identity of a dial-up user

60
Q

RIP (Routing Information Protocol)

A

a routing protocol based on the hop count to the destination

61
Q

ATM (Asynchronous Transfer Mode)

A

a high-speed protocol that makes use of 53-byte frames

62
Q

BSC (Binary Synchronous Control)

A

a character-oriented protocol that uses control characters

63
Q

CSMA/CD (Carrier Sense Multiple Access/Collision Detect)

A

a protocol that transmits data when the link is clear; and detects any collisions

64
Q

Frame Relay

A

a protocol for WAN connections

65
Q

HDLC (High-Level Data Link Control)

A

a bit-oriented protocol for synchronous transmissions

66
Q

IEEE 802

A

a series of data link protocols promulgated by the Institute of Electrical and Electronic Engineers

67
Q

IEEE 802.3 (Ethernet)

A

also known as CMSA/CD

68
Q

IEEE 802.4 (Token Bus)

A

a token-passing protocol used on a bus network

69
Q

IEEE 802.5 (Token Ring)

A

a token-passing protocol used on a ring network

70
Q

IEEE 802.11

A

wireless network protocols and standards

71
Q

PPP (Point-to-a protoPoint Protocol)

A

used for dial-up connections

72
Q

WEP (Wired Equivalent Privacy)

A

a wireless LAN protocol that provides authentication and encryption

73
Q

WPA (Wi-Fi Protected Access) and WPA2

A

wireless LAN protocols that provide authentication and encryption

74
Q

IrDA

A

a protocol that supports infrared point-to-point and multipoint communication between devices

75
Q

V.24

A

a protocol that transmits data between the Data Terminate Emulator (DTE) and Data Communication Emulator (DCE)

76
Q

V.92

A

a protocol for standard dial-up modems

77
Q

X21

A

a specification for serial communications over synchronous lines

78
Q

X21 bis

A

indicates the connection when flags are detected