Chapter 10 Flashcards

1
Q

sources of threats

A

human error
computer crime
natural disaster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

types of security loss

A
unauthorized data disclosure
incorrect data modification
faulty service
denial of service
loss of infrastructure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

unauthorized data disclosure

A

when a threat obtains data that is supposed to be protected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

pretexting

A

when someone deceives by pretending to be someone else

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

phishing

A

used for obtaining unauthorized data by using pretexting through email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

spoofing

A

same as pretexing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IP spoofing

A

an intruder uses another site’s IP address as a disguise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

sniffing

A

intercepting computer communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

wardrivers

A

take computers with wireless connections through an area and search for unprotected networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

faulty service

A

problems that result from incorrect system operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

usurpation

A

when computer criminals invade a computer system and replace legitimate programs with their own

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

unauthorized data disclosure (example)

A

if a professor were to release students names and grades to the public, which is illegal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

incorrect data modification (example)

A

if an employee incorrectly increases a sales discount for a customer
an employee’s salary is incorrectly modified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

faulty service (example)

A

if a person incorrectly preforms a task like putting the wrong box of cereal on the shelf
if a system developer were to incorrectly write programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

denial of service (example)

A

if a person inadvertently shuts down a Web server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

loss of infrastructure (example)

A

a bulldozer cutting a conduit of fiber-optic cables and a floor buffer crashing into a rack of web servers

17
Q

intrusion detection system (IDS)

A

a computer program that senses when another computer is attempting to scan or access a computer or network

18
Q

brute force attack

A

a password cracker tries every possible combination of characters

19
Q

encryption

A

the process or transferring clear text into coded, unintelligible text for secure storage or communication

20
Q

key

A

a number used to encrypt the data

21
Q

symmetric encryption

A

the same key used to encode and decode

22
Q

asymmetric encryption

A

two keys used to encode and decode

23
Q

public key encryption

A

each site has a public key for encoding messages and a private key for decoding them

24
Q

Secure Sockets Layer

A

combination of public key and encryption and symmetric encryption

25
Q

firewall

A

computing device that prevents unauthorized network access

26
Q

packet-filtering firewall

A

examines each part of a message and determines whether to let that part pass

27
Q

malware

A

a broad category of software that includes viruses, spyware, and adware

28
Q

payload

A

can delete programs or data

29
Q

Trojan horses

A

viruses that masquerade as useful programs or files

30
Q

worm

A

a virus that self-propagates using the internet or other computer network

31
Q

spyware

A

programs installed on the user’s computer without the user’s knowledge or permission

32
Q

adware

A

similar to spyware but resides in the background and observes user behavior

33
Q

malware safeguards

A

antivirus programs
antimalware programs
open email attachments from known sources

34
Q

key escrow

A

when data are encrypted, a trusted party should have a copy of the encryption key

35
Q

three systems procedures

A

normal operation
backup
recovery

36
Q

honeypots

A

false targets for computer criminals to attack