12 - Information Security Management Flashcards

1
Q

Advanced Persistent Threat (APT)

A

A sophisticated, possibly long-running computer hack that is perpetrated by large, well-funded orgs like governments.

APTs are means to engage in cyber warfare.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Adware

A

Programs installed on user comp without knowledge or permission

Reside in the background and unknown to the user, observer user’s actions and keystrokes, modify comp. activity, and report the user’s activities to sponsoring orgs.

Most adware is benign in that it does not perform malicious acts or steal data. It does, however, watch user activity and produce pop-up ads.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Asymmetric Encryption

A

An encryption method whereby diff. keys are used to encode and decode the message. (Need 2 diff codes)

ie. Public/private keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Authentication

A

The process whereby an information system verifies (Validates) a user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Biometric authentication

A

The use of personal physical characteristics, such as fingerprints, facial features, and retinal scans, to authenticate users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Brute Force Attack

A

A password-cracking program that tries every possible combination of characters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cookies

A

A small file that is stored on the user’s computer by a browser.

Cookies can be used for authentication, for storing shopping cart contents and user preferences, and other legitimate purposes.

Cookies can also be used to implement spyware (323)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Data administration

A

An organization-wide function that developes and enforces data policies and standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Data safeguards

A

Measures used to protect databases and other data assets from threats. Includes data rights and responsibilities, encryption, backup and recovery, and physical security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DataBASE administration

A

A person or department that develops procedures and practices to ensure efficient and orderly multiuser processing of the database, to control changes to database structure, and protect the database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Denial of Service

DOS

A

Security problem in which users are not able to access an information system

Can be caused by human errors, natural disasters, or malicious activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Drive-by sniffer

A

A person who takes a computer with a wireless connection through an area and searches for unprotected wireless networks in an attampt to gain free internet access, or gather unauthorized data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Email spoofing

A

Synonym for phishing

Technique for obtaining unauthorized data that uses pretexting via email. The phisher pretends to be a legitimate company, and sends email requests for confidential data, such as account numbers, Social Sec. numbers, account passwords, etc.

Phishers direct traffic to their sites under the guise of legitimate business.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Encryption

A

The process of transforming clear text into coded, unintelligible text for secure storage or communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Encryption Algorithms

A

Algorithms used to transform clear text into coded, unintelligible text for secure storage or communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

FIDO

A

First Identity OnLine

A set of open standards and protocols under development as an alternative to password authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Firewall

A

Computer devices located between public and private networks that prevent unauthorized access to or from the internal network.

A firewall can be a special-purpose computer or it can be a program or general-purpose computer or on a router.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Hacking

A

A form of computer crime in which a person gains unauthorized access to a computer system.

Although some people hack for the sheer joy of doing it, other hackers invade systems for the malicious purposes of stealing or modifying data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

https

A

An indication that a Web browser is using the SSL/TLS protocol to provide secure communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Human safeguards

A

Steps taken to protect against security threats by establishing appropriate procedures for users to follow during system use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Identification

A

The process whereby an information system identifies a user by requiring the user to lsign on with a username and password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Internal firewalls

A

Firewalls that sit inside the organizational network.

23
Q

Intrusion Detection System (IDS)

A

A computer program that senses when another computer is attempting to scan the disk or otherwise access a computer.

24
Q

IP Spoofing

A

A type of spoofing whereby an intruder uses another site’s IP address as if it were that other site.

25
Q

Key

A
  1. A column or group of columns that ID’s a unique row in a table. Also ref.: Primary Key
  2. A number used to encrypt data. The encryption algorithm applies the key to the original message to produce the coded message. Decoding (decrypting) a message is similar; a key is applied to the coded message to recover the original text.
26
Q

Key escrow

A

A control procedure whereby a trusted party is given a copy of a key used to encrypt database data.

27
Q

Malware

A

Viruses, worms, trojan horses, spyware, and adware.

28
Q

Malware definitions

A

Patterns that exist in malware code. Antimalware vendors update these definitions continuously and incorporate them into their products in order to better fight against malware.

29
Q

Packet-filtering Firewall

A

A firewall that examines each packet and determines whether to let the packet pass.

To make this decision, it examines the source address, destination address, and other data.

30
Q

Payload

A

Program codes of viruses that cause unwanted or hurtful actions, such as deleting programs or data, or even worse, modifying data in ways that are undetected by the user.

31
Q

Perimeter Firewall

A

A firewall that sits outside the organizational network; it is the first device that Internet traffic encounters.

32
Q

Personal identification number

(PIN)

A

A form of authentication whereby the user supplies a number that only he or she knows.

33
Q

Phisher

A

An individual or organization that spoofs legitimate companies in an attempt to illegally capture personal data such as CC numbers, email accounts, and driver’s license numbers.

34
Q

Phishing

A

A technique for obtaining unauthorized data that uses pretexting via email. The phisher pretends to be a legitimate company and sends an email requesting confidential data.

35
Q

Pretexting

A

Deceiving someone over the internet by pretending to be another person or organization.

36
Q

Public key/private key

A

A special version of asymmetric encryption that is popular over the internet.

With this method, each site has a public key for encoding a message and a private key for decoding.

37
Q

Safeguard

A

Any action, device, procedure, technique, or other measure that reduces system vulnerability to threats.

38
Q

Secure Socket Layer (SSL)

A

A protocol that uses both asymmetric and symmetric encryption. When SSL is in use, the browser address will begin with https://.

Most recent version of SSL is called TLS.

39
Q

Smart Cards

A

Plastic cards similar to credit cards that have microchips.

The microchip, which holds much more data than a magnetic strip, is loaded with ID’ing data. Normally requires a PIN.

40
Q

Sniffing

A

Technique for intercepting computer communications. With wired networks, sniffing requires a physical connection to the network. With wireless networks, no such connection is required.

41
Q

Spoofing

A

When someone pretends to be someone else with the intent of obtaining unauthorized data. If you pretend to be your professor, you are spoofing your professor.

42
Q

Spyware

A

Programs installed on the user’s computer without the user’s knowledge or permission that reside in the background and unknown to the user, observer user’s actions and keystrokes, modify comp. activity, and report the user’s activities to sponsoring orgs.

Malicious spyware captures keystrokes to obtain user names, passwords, account #s, and other sensitive information. Other spyware is used for marketing analyses, observing what users do, Web sites visited, products examined and purchased, and so on.

43
Q

SQL injection attack

A

This situation occures when a user obtains unauthorized access to data by entering a SQL statement into a form in which they are supposed to enter a name or other data.

if the program is improperly designed, it will accept this statement and make it part of the SQL command that it issues to the DBMS.

44
Q

Symmetric encryption

A

An encryption method whereby the same key is used to encode and decode the message.

45
Q

Target

A

the asset that is desired by a security threat.

46
Q

Technical safeguards

A

Security safeguards that involve the hardware and software component of info systems.

47
Q

Text mining

A

The application of statistical techniques on text streams for locating particular words, word patterns, or even correlating those word patterns with personality profiles.

48
Q

Threat

A

A person or org that seeks to obtain or alter data or other IS assets illegally, without the owner’s permission and often without the owner’s knowledge.

49
Q

Transport Layer Security (TLS)

A

The new name for a later version of Secure Socket Layer (SSL)

50
Q

Trojan Horses

A

Viruses that masquerade as useful programs or files.

A typical trojan horse appears to be a computer gam, MP3 file, or some other innocuous program.

51
Q

Usurption

A

Occurs when unauthorized programs invade a computer system and replace legitimate programs.

Such unauthorized programs typically shut down the legitimate system and substitute their own processing to spy, steal, and manipulate data or acheieve other purposes.

52
Q

Virus

A

Computer program that self-replicates.

53
Q

Vulnerability

A

An opportunity for threats to gain access to individual or organizational assets.

Some vulnerabilities exist because there are no safeguards or because the existing safeguards are ineffective.

54
Q

Worm

A

A virus that propagates itself using the internet or some other computer network
Worm code is written specifically to infect another computer as quickly as possible.