Chapter 17: Information Security Flashcards Preview

BIM Final Exam > Chapter 17: Information Security > Flashcards

Flashcards in Chapter 17: Information Security Deck (11):
1

What are data harvesters and cash-out fraudsters?

Data harvesters: Cybercriminals who infiltrate systems and collect data for illegal resale

Cash-out fraudsters: Purchase data from the harvesters and use stolen credit card data for illegal accounts

2

What are botnets of zombie computers?

Networks of infiltrated and compromised machines controlled by a central command

3

What are distributed denial of service? (DDoS)

Sending spam from thousands of difficult to shut down accounts, launching click fraud efforts

4

What is social engineering?

Tricking employees into revealing information by impersonating someone else

5

What is phishing?

Acquiring sensitive information or tricking someone into installing malicious software

6

What is a spoofed email?

Email that has been altered to seem as if it came form another source

7

What are zero-day exploits?

Attacks that are so new they have not been clearly defined

8

What is malware?

Seeks to compromise a computing system without permission

9

What are viruses, worms and trojans?

Viruses: Programs that infect other software or files

Worms: Programs that take advantage of security vulnerability

Trojans: Exploits that sneak in by masquerading as something they are not

10

What are honeypots?

Bogus targets meant to draw out hacking attempts

11

What are blacklists and whitelists?

Blacklists: Deny the entry of specific IP addresses

Whitelists: Only permit communication with approved entities