Chapter 17 Flashcards

1
Q

Intrusion detection systems

A

A system that monitors network use for potential hacking attempts. Such a system may take preventative action to block, isolate, or identify attempted infiltration, and raise further alarms to warn security personnel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

distributed denial of service (DDoS)

A

An attack where a firm’s computer systems are flooded with thousands of seemingly legitimate requests, the sheer volume of which will slow or shut down the site’s use. DDoS attacks are often performed via botnets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

honeypots

A

A seemingly tempting, but bogus target meant to draw hacking attempts. By monitoring infiltration attempts against a honeypot, organizations may gain insight into the identity of hackers and their techniques, and they can share this with partners and law enforcement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

public key encryption

A

A two key system used for securing electronic transmissions. One key distributed publicly is used to encrypt (lock) data, but it cannot unlock data. Unlocking can only be performed with the private key. The private key also cannot be reverse engineered from the public key. By distributing public keys, but keeping the private key, Internet services can ensure transmissions to their site are secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

hack

A

A term that may, depending on the context, refer to either 1) breaking into a computer system, or 2) a particularly clever solution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

CAPTCHAs

A

An acronym for Completely Automated Public Turing Test to Tell Computers and Humans Apart. CAPTCHAs are those scrambled character images that many sites require to submit some sort of entry (account setup, ticket buying) and are meant to be a Turing Test—a test to distinguish if a task is being performed by a computer or a human.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

hacker

A

A term that, depending on the context, may be applied to either 1) someone who breaks into computer systems, or 2) to a particularly clever programmer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

cash-out fraudsters

A

Criminals that purchase assets from data harvesters to be used for illegal financial gain. Actions may include using stolen credit card numbers to purchase goods, creating fake accounts via identity fraud, and more.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

encryption

A

Scrambling data using a code or formula, known as a cipher, such that it is hidden from those who do not have the unlocking key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

zero-day exploits

A

Attacks that are so new that they haven’t been clearly identified, and so they haven’t made it into security screening systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

whitelists

A

Highly restrictive programs that permit communication only with approved entities and/or in an approved manner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

blacklists

A

Programs that deny the entry or exit of specific IP addresses, products, Internet domains, and other communication restrictions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

certificate authority

A

A trusted third party that provides authentication services in public key encryption schemes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Phishing

A

A con executed using technology, typically targeted at acquiring sensitive information or tricking someone into installing malicious software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

spoofed

A

Term used in security to refer to forging or disguising the origin or identity. E-mail transmissions and packets that have been altered to seem as if they came from another source are referred to as being “spoofed.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

brute-force attack

A

An attack that exhausts all possible password combinations in order to break into an account. The larger and more complicated a password or key, the longer a brute-force attack will take.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

white hat hackers

A

Someone who uncovers computer weaknesses without exploiting them. The goal of the white hat hacker is to improve system security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

key

A

Code that unlocks encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

multi-factor authentiction

A

When identity is proven by presenting more than one item for proof of credentials. Multiple factors often include a password and some other identifier such as a unique code sent via e-mail or mobile phone text, a biometric reading (e.g. fingerprint or iris scan), a swipe or tap card, or other form if identification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

hacktivists

A

A protester seeking to make a political point by leveraging technology tools, often through system infiltration, defacement, or damage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

black hat hackers

A

A computer criminal.

22
Q

Botnets

A

Hordes of surreptitiously infiltrated computers, linked and controlled remotely, also known as zombie networks

23
Q

dumpster diving

A

Combing through trash to identify valuable assets.

24
Q

firewalls

A

A system that acts as a control for network traffic, blocking unauthorized traffic while permitting acceptable use.

25
Q

Biometrics

A

Technologies that measure and analyze human body characteristics for identification or authentication. These might include fingerprint readers, retina scanners, voice and face recognition, and more.

26
Q

Data Harvesters

A

Cybercriminals who infiltrate systems and collect data for illegal resale.

27
Q

Shoulder Surfing

A

Gaining compromising information through observation (as in looking over someone’s shoulder).

28
Q

Who’s business is information security?

A

Information security is everyone’s business and needs to be made a top organizational priority.

29
Q

What sort of things can result from a data breach?

A

Firms suffering a security breach can experience direct financial loss, exposed proprietary information, fines, legal payouts, court costs, damaged reputations, plummeting stock prices, and more.

30
Q

Is info security just a tech problem?

A

Information security isn’t just a technology problem; a host of personnel, operational, and procedural factors can create and amplify a firm’s vulnerability.

31
Q

What are some of the motivations behind security threats?

A

Computer security threats have moved beyond the curious teen with a PC and are now sourced from a number of motivations, including theft, leveraging compromised computing assets, extortion, espionage, warfare, terrorism, national security, pranks, protest, and revenge.

32
Q

Where can threats come from?

A

Threats can come from both within the firm as well as from the outside.

33
Q

Describe how cybercriminals operate?

A

Cybercriminals operate in an increasingly sophisticated ecosystem where data harvesters and tool peddlers leverage sophisticated online markets to sell to cash-out fraudsters and other crooks.

34
Q

What makes pursuit and prosecution of cybercriminals difficult?

A

Technical and legal complexity make pursuit and prosecution difficult.

35
Q

What can result from Govt surveillance and how?

A

Government surveillance efforts can put citizens and corporations at risk if poorly executed and ineffectively managed.

36
Q

Why do law enforcement find is difficult to deal with the hacker threat?

A

Many law enforcement agencies are underfunded, underresourced, and underskilled to deal with the growing hacker threat.

37
Q

What makes an organizations information assets vulnerable?

A

An organization’s information assets are vulnerable to attack from several points of weakness, including users and administrators, its hardware and software, its networking systems, and various physical threats.

38
Q

What is the difference between social engineering and phishing?

A

Social engineering attempts to trick or con individuals into providing information, while phishing techniques are cons conducted through technology.

39
Q

Can phishing scams be avoided?

A

While dangerous, a number of tools and techniques can be used to identify phishing scams, limiting their likelihood of success.

40
Q

How can social media sites assist hackers?

A

Social media sites may assist hackers in crafting phishing or social engineering threats, provide information to password crackers, and act as conduits for unwanted dissemination of proprietary information.

41
Q

Do typical users create sufficient passwords?

A

Most users employ inefficient and insecure password systems; however, techniques were offered to improve one’s individual password regime.

42
Q

What are 3 types of malware?

A

Viruses, worms, and Trojans are types of infecting malware. Other types of malware might spy on users, enlist the use of computing assets for committing crimes, steal assets, destroy property, serve unwanted ads, and more.

43
Q

Name a type of attack or scam that might show up on a webpage.

A

Examples of attacks and scams launched through advertising on legitimate Web pages highlight the need for end-user caution, as well as for firms to ensure the integrity of their participating online partners.

44
Q

What does SQL injection show and how must developers address it and related techniques?

A

SQL injection and related techniques show the perils of poor programming. Software developers must design for security from the start—considering potential security weaknesses, and methods that improve end-user security (e.g., in areas such as installation and configuration).

45
Q

How does encryption benefit an organization?

A

Encryption can render a firm’s data assets unreadable, even if copied or stolen. While potentially complex to administer and resource intensive, encryption is a critical tool for securing an organization’s electronic assets.

46
Q

How can end users improve the info security of themselves and their organizations?

A

End users can engage in several steps to improve the information security of themselves and their organizations. These include surfing smart, staying vigilant, updating software and products, using a comprehensive security suite, managing settings and passwords responsibly, backing up, properly disposing of sensitive assets, and seeking education.

47
Q

What do frameworks such as ISO27k provide?

A

Frameworks such as ISO27k can provide a road map to help organizations plan and implement an effective security regime.

48
Q

What might be the repercussion of an organization not meeting security compliance commitments?

A

Many organizations are bound by security compliance commitments and will face fines and retribution if they fail to meet these commitments.

49
Q

Does compliance always equal security?

A

The use of frameworks and being compliant is not equal to security. Security is a continued process that must be constantly addressed and deeply ingrained in an organization’s culture.

50
Q

Why is security about trade-offs?

A

Security is about trade-offs—economic and intangible. Firms need to understand their assets and risks in order to best allocate resources and address needs.

51
Q

Why is info security not simply just a technical fix?

A

Information security is not simply a technical fix. Education, audit, and enforcement regarding firm policies are critical. The security team is broadly skilled and constantly working to identify and incorporate new technologies and methods into their organizations. Involvement and commitment is essential from the boardroom to frontline workers, and out to customers and partners.