Chapter 2 Flashcards

1
Q

Name and explain 5 threats to information security:

A

1- Human Error: acts performed without malicious intent

2- Espionage or Trespass: Access of protected information by unauthorized individuals.

3- Forces of Nature.

4- Social Engineering: using social skills to convince people to reveal valuable information to the attacker.

5- Software Attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name 5 Espionage/Trespass methods:

A

1- Shoulder surfing.
2- Expert hackers.
3- Unskilled hackers.
4- Cracker: removes software protection designed to prevent unauthorized duplication.
5- Phreaker: hacks the public telephone system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are some Social engineering tricks?

A

1- Advance-fee scam
2- Phishing attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Name and explain 6 methods of Software Attacks:

A

1- Computer virus: software that self-replicates and attaches to other files/programs (Can execute secretly).

2- Trojan Horses: a non-replicating program that appears legitimate. After gaining the trust, it secretly performs malicious and illicit activities when executed. (hard to detect!).

3- DoS: An attacker sends many connection or information requests to a target to overload the system.

4- DDoS: Same as a “Dos”, but is launched from many different devices in different locations, making it hard to track.

5- IP spoofing: gaining unauthorized access by assuming a trusted IP address.

6- Worm: a self-replicating program that automatically executes itself.

7- Ransomware: encrypting a user’s data and demanding a ransom to decrypt it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly