Chapter 2 Flashcards

(34 cards)

1
Q

Organization Security

A

Without data, loses its record of transactions and /or ability to deliver value to customers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a threat?

A

An object, person, or other entity that represents a constant danger to an asset.
64% of organizations had malware infections
14% indicated system penetration by an outsider.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is information extortion? Describe how such an attack can cause loses?

A

Cyberextortion its an attack with a demand for money to stop the attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cracker? Phreaker?

A

Cracker - cracks or removes software protection designed to prevent unauthorized duplication.

Phreaker - hacks the public telephone network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Forces of Nature?

A

Disrupts storage, transmission, and use of information. Organizations must implement controls to limit damage and prepare contingency plans for continued operation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Human Error or Failure?

A

Inexperience
Improper training
Incorrect assumptions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What happens because of employee mistakes?

A

Revelation of classified data, entry of erroneous data, accidental deletion or modification of data, storage of data in unprotected areas.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Information Extortion?

A

Steals information and asks for money, for its return or nondisclosure.
Credit cards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Missing, Inadequate, or Incomplete

A

It can make organization vulnerable to loss, damage, or disclosure of information assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Sabotage or Vandalism

A

Cyberterrorism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Theft?

A

Illegal taking of another’s physical, electronic, or intellectual property.
Physical theft is controlled relatively easily.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Technical Hardware failures or error?

A

Distribution of flawed equipment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Software failures?

A

Hidden faults

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is an attack?

A

Acts that exploits vulnerability.

Done by threat agent that damages or steals organization’s information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Types of attacks?

A
Malicious code
Hoaxes
Back door
Password crack
Brute force
Dictionary
Denial of Service (DoS)
Distributed Denial of Service
(DDoS)
Spoofing
Man-in-the-middle.
Spam
Mail Bombing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is malicious code?

A

Malicious code: viruses, worms, horses, web scripts, with intent to destroy or steal information.

17
Q

What is hoaxes?

A

Hoaxes: transmission of a virus hoax with a real virus attached.

18
Q

What is back door?

A

Backdoor: gaining access to system.

19
Q

What password crack?

A

Password crack: attempting to reverse calculate a password.

20
Q

What is brute force?

A

Trying every possible combination of options of a password.

21
Q

What is dictionary?

A

Selects specific accounts to attack and uses commonly used passwords.

22
Q

What is DoS?

A

Denial of Service:

large number of information requests to a target.

23
Q

What is DDoS?

A

Distributed Denial of Service:

coordinated stream of requests is launched against target from many locations.

24
Q

What is spoofing?

A

Intruder assumes a trusted IP address.

25
What is man-in-the-middle?
Attacker monitors packets, modifies them, and inserts them back into network.
26
What is spam?
commercial e-mail.
27
What is mail bombing?
DoS, large quantities of e-mail to target.
28
Types of Attacks? (2)
``` Sniffers Phishing Pharming Social Engineering Timing attack. ```
29
What are sniffers?
software that monitors data travelling over network.
30
What is phishing?
A try to get personal information from an individual, posing as legitimate entity.
31
What is pharming?
Redirection of legitimate web traffic to illegimate site.
32
What is social engineering?
Using social skills to convince people to reveal access credentials or other valuable information to attacker.
33
What is timing attack?
Exploring the contents of a web browser cache to create a malicious cookie.
34
Why does polymorphism cause greater concern than traditional malware? How does it affect detection?
Polymorphic malware polymorphs, changes overtime, therefore it is harder to detect.