Chapter 17: Information Security Flashcards Preview

BIM Final Exam > Chapter 17: Information Security > Flashcards

Flashcards in Chapter 17: Information Security Deck (11)
Loading flashcards...
1
Q

What are data harvesters and cash-out fraudsters?

A

Data harvesters: Cybercriminals who infiltrate systems and collect data for illegal resale

Cash-out fraudsters: Purchase data from the harvesters and use stolen credit card data for illegal accounts

2
Q

What are botnets of zombie computers?

A

Networks of infiltrated and compromised machines controlled by a central command

3
Q

What are distributed denial of service? (DDoS)

A

Sending spam from thousands of difficult to shut down accounts, launching click fraud efforts

4
Q

What is social engineering?

A

Tricking employees into revealing information by impersonating someone else

5
Q

What is phishing?

A

Acquiring sensitive information or tricking someone into installing malicious software

6
Q

What is a spoofed email?

A

Email that has been altered to seem as if it came form another source

7
Q

What are zero-day exploits?

A

Attacks that are so new they have not been clearly defined

8
Q

What is malware?

A

Seeks to compromise a computing system without permission

9
Q

What are viruses, worms and trojans?

A

Viruses: Programs that infect other software or files

Worms: Programs that take advantage of security vulnerability

Trojans: Exploits that sneak in by masquerading as something they are not

10
Q

What are honeypots?

A

Bogus targets meant to draw out hacking attempts

11
Q

What are blacklists and whitelists?

A

Blacklists: Deny the entry of specific IP addresses

Whitelists: Only permit communication with approved entities