Week 9 Flashcards
```
~~~
define Security
- policies, procedures and technical measures used to prevent unathourized access, alteration, theft or physical damage to infomation ystems
define controls
- methods policies and organzational procedure that ensure saftey of organzations assets: accuracy and reliability of its accounting records: and operational adhernece to mangement standards
why are systems vulnuable
- accesbility of data on networks
- hardware problems
- software problems
- disatsers
- use of networks outside of firms control
- loss and theft of portable devices
internet vulnurabilites
- email, instant messaging, peer-peer networking (P2P)
sniffing
- an eavesdropping program that monitors informations travelling over a network
- the interception and analysis of data packets as they travel across a network
SSIDs (service set idenitfiers)
indeintfy access points, broadcast multiple times can be idenitfied by sniffer programsn that monitor your internet activity
define war driving
- Eavesdropper drive by building and try to detect SSID and gain access to network and resources
define rouge access points
a wireless access point has been installed on a secure network without explicit authorization from a local network
name the 5+ malicious software
- virsuses
- worms
- trojan horses
- SQL injection attacks
- ransomware
- spyware
define viruses
a rogue software program that attaches itself to other software programs
define worms
independent computer program that copy themselves across computers
trojan horse
a software program that downloads itself disguised as a legitimate program
SQL injection attacks
interface with queries and gaining access to data
define ransomware
extort money from users by taking control of their computers
define spyware
malicious software monitoring user activity
- keyloggers - reset browsers home pages - redirect search request - slow computer performance by taking up memory
define hackers
-can cause systems intrusion or system damage
define cybervandilism
intentional disruption, defacement, destruction of website or corporate information system
Spoofing get that they are interacting with a known, trusted source
denial of service (DoS)
-Hackers flood a network server or web server with many thousands of false communications or requests for services to crash the network
distrubuted denial of servce attacks (DDoS)
Uses numerous computers to inundate and overwhelm the network from many launch points
define Botnets
a group of computers which have been infected by malware and have come under the control of a malicious actor
define cycbercrime
- Any crime where a cyber element has a substantial role in the commision of a criminal offence
two categories of cybercrime
technology as target
- unauthorized use of a computer
- mischeif of data
technology as instrument
- fraud
- indentity theft
define phishing
Spear phishing
Whaling
- Evil twins: bogus wifi network
- pharming: redirecting to a bogus web page
define click fruad
- Click bots
- Trick a platform or service into thinking real users are interacting with a web page or app
define cyberterrorism
- Cyberattack using exploiting computer or communication networks to cause sufficient destruction or disruption to generate fear or to intimidate a society into an ideological goal
- Use cyberspace to cause physical, psychosocial, political, economic, ecological, or other damage