Chapter 10 Flashcards
(36 cards)
sources of threats
human error
computer crime
natural disaster
types of security loss
unauthorized data disclosure incorrect data modification faulty service denial of service loss of infrastructure
unauthorized data disclosure
when a threat obtains data that is supposed to be protected
pretexting
when someone deceives by pretending to be someone else
phishing
used for obtaining unauthorized data by using pretexting through email
spoofing
same as pretexing
IP spoofing
an intruder uses another site’s IP address as a disguise
sniffing
intercepting computer communications
wardrivers
take computers with wireless connections through an area and search for unprotected networks
faulty service
problems that result from incorrect system operations
usurpation
when computer criminals invade a computer system and replace legitimate programs with their own
unauthorized data disclosure (example)
if a professor were to release students names and grades to the public, which is illegal
incorrect data modification (example)
if an employee incorrectly increases a sales discount for a customer
an employee’s salary is incorrectly modified
faulty service (example)
if a person incorrectly preforms a task like putting the wrong box of cereal on the shelf
if a system developer were to incorrectly write programs
denial of service (example)
if a person inadvertently shuts down a Web server
loss of infrastructure (example)
a bulldozer cutting a conduit of fiber-optic cables and a floor buffer crashing into a rack of web servers
intrusion detection system (IDS)
a computer program that senses when another computer is attempting to scan or access a computer or network
brute force attack
a password cracker tries every possible combination of characters
encryption
the process or transferring clear text into coded, unintelligible text for secure storage or communication
key
a number used to encrypt the data
symmetric encryption
the same key used to encode and decode
asymmetric encryption
two keys used to encode and decode
public key encryption
each site has a public key for encoding messages and a private key for decoding them
Secure Sockets Layer
combination of public key and encryption and symmetric encryption