Chapter 17: Information Security Flashcards Preview

BIM Final Exam > Chapter 17: Information Security > Flashcards

Flashcards in Chapter 17: Information Security Deck (11)
Loading flashcards...

What are data harvesters and cash-out fraudsters?

Data harvesters: Cybercriminals who infiltrate systems and collect data for illegal resale

Cash-out fraudsters: Purchase data from the harvesters and use stolen credit card data for illegal accounts


What are botnets of zombie computers?

Networks of infiltrated and compromised machines controlled by a central command


What are distributed denial of service? (DDoS)

Sending spam from thousands of difficult to shut down accounts, launching click fraud efforts


What is social engineering?

Tricking employees into revealing information by impersonating someone else


What is phishing?

Acquiring sensitive information or tricking someone into installing malicious software


What is a spoofed email?

Email that has been altered to seem as if it came form another source


What are zero-day exploits?

Attacks that are so new they have not been clearly defined


What is malware?

Seeks to compromise a computing system without permission


What are viruses, worms and trojans?

Viruses: Programs that infect other software or files

Worms: Programs that take advantage of security vulnerability

Trojans: Exploits that sneak in by masquerading as something they are not


What are honeypots?

Bogus targets meant to draw out hacking attempts


What are blacklists and whitelists?

Blacklists: Deny the entry of specific IP addresses

Whitelists: Only permit communication with approved entities