Chapter 10 Flashcards

(36 cards)

1
Q

sources of threats

A

human error
computer crime
natural disaster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

types of security loss

A
unauthorized data disclosure
incorrect data modification
faulty service
denial of service
loss of infrastructure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

unauthorized data disclosure

A

when a threat obtains data that is supposed to be protected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

pretexting

A

when someone deceives by pretending to be someone else

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

phishing

A

used for obtaining unauthorized data by using pretexting through email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

spoofing

A

same as pretexing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IP spoofing

A

an intruder uses another site’s IP address as a disguise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

sniffing

A

intercepting computer communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

wardrivers

A

take computers with wireless connections through an area and search for unprotected networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

faulty service

A

problems that result from incorrect system operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

usurpation

A

when computer criminals invade a computer system and replace legitimate programs with their own

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

unauthorized data disclosure (example)

A

if a professor were to release students names and grades to the public, which is illegal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

incorrect data modification (example)

A

if an employee incorrectly increases a sales discount for a customer
an employee’s salary is incorrectly modified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

faulty service (example)

A

if a person incorrectly preforms a task like putting the wrong box of cereal on the shelf
if a system developer were to incorrectly write programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

denial of service (example)

A

if a person inadvertently shuts down a Web server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

loss of infrastructure (example)

A

a bulldozer cutting a conduit of fiber-optic cables and a floor buffer crashing into a rack of web servers

17
Q

intrusion detection system (IDS)

A

a computer program that senses when another computer is attempting to scan or access a computer or network

18
Q

brute force attack

A

a password cracker tries every possible combination of characters

19
Q

encryption

A

the process or transferring clear text into coded, unintelligible text for secure storage or communication

20
Q

key

A

a number used to encrypt the data

21
Q

symmetric encryption

A

the same key used to encode and decode

22
Q

asymmetric encryption

A

two keys used to encode and decode

23
Q

public key encryption

A

each site has a public key for encoding messages and a private key for decoding them

24
Q

Secure Sockets Layer

A

combination of public key and encryption and symmetric encryption

25
firewall
computing device that prevents unauthorized network access
26
packet-filtering firewall
examines each part of a message and determines whether to let that part pass
27
malware
a broad category of software that includes viruses, spyware, and adware
28
payload
can delete programs or data
29
Trojan horses
viruses that masquerade as useful programs or files
30
worm
a virus that self-propagates using the internet or other computer network
31
spyware
programs installed on the user's computer without the user's knowledge or permission
32
adware
similar to spyware but resides in the background and observes user behavior
33
malware safeguards
antivirus programs antimalware programs open email attachments from known sources
34
key escrow
when data are encrypted, a trusted party should have a copy of the encryption key
35
three systems procedures
normal operation backup recovery
36
honeypots
false targets for computer criminals to attack