Week 4 (Ch. 8) Flashcards

1
Q

what is cybercrime

A

illegal activity using computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what percentage of business report cybercrimes

A

12%

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what are the two types of cybercrime

A

technology as target of crime and technology used to commit crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is malware

A

‘malicious software’: program designed to steal or destroy data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what are viruses and worms

A

codes that replicate to destroy data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is spyware

A

software that gathers knowledge without users knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is ransomware

A

software that encrypts data and requires payment to access it again

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is a DoS (denial of service)

A

prevents web server from serving users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is a DDoS

A

multiple users send requests to crash service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is identity theft

A

criminal gains access and uses personal information without your knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is social engineering

A

criminals lure individuals into giving up personal information (scam calls)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is hacking

A

accessing someones computer without their permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is phishing

A

user receives email with fake link requiring user to input username and password for criminal to steal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is spoofing

A

criminals disguise themselves by modifying their IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is piracy

A

illegal copying and distribution/use of of software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is the information security triad

A

confidentiality: restricting access to those who are allowed to view information
integrity: information accessed has not been modified or altered
availability: information can be accessed and modified by anyone authorized to do so at a given time frame

17
Q

what is example of authentication using something they know

A

password, questions

18
Q

what is an example of authentication using something they have

A

key, card

19
Q

what is an example of authentication using something they are

A

physical characteristic: finger print

20
Q

what is multi factor authentication

A

combination of two or more factors above

21
Q

what is access control

A

determines which users are allowed to read, modify, add or delete information

22
Q

what is an access control list (ACL)

A

list of users who are able to perform specific actions

23
Q

what are role based access control (RBAC)

A

users are assigned to roles and roles are given ability to perform specific actions

24
Q

what is encryption

A

scrambles data so it is unreadable to those without public key

25
Q

what is symmetric key encryption

A

two parties share encryption key

26
Q

what is public key encryption

A

user must use public key to send message and receiver must use private key to view message

27
Q

what are firewalls

A

protects servers by blocking packets that do not meet certain criteria

28
Q

what are anti-virus programs

A

softwares that can be installed to detect and remove malicious programs

29
Q

what are intrusion detection systems

A

identifies if network is being attacked

30
Q

what are examples of physical security

A

locked doors, secured equipment, physical intrusion detection

31
Q

what are the three sources of security problems

A

1) human error and mistakes
2) malicious human activity
3) natural events and disasters

32
Q

what are the three types of security safegaurds

A

1) technical safeguards
2) data safeguards
3) human safeguards

33
Q

what is a WAR room

A

office space with basic equipment, charged monthly subscription fee

34
Q

what is a cold site

A

empty room or building used for recovery

35
Q

what is a hot site

A

recovery location available 24/7