Chapter 5 Flashcards

1
Q

software to detect and remove viruses and other malware

A

anti-virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

another term for public key encryption

A

asymmetric key encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

establishing a user’s identity

A

authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

method of by-passing security in a system, built in by the system designers

A

backdoor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

process of registering a user for a biometric system by taking an initial sample

A

biometric enrolment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

measurements taken from a biometric sample

A

biometric template

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

use of fingerprints, retina scans, or other body features as an authentication mechanism

A

biometrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

group of zombie computers under the control of a criminal

A

botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

attempt to break a password by trying all possible combinations of letters, numbers, and symbols

A

brute force attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

system designed to create text that is unreadable to a computer but understandable to a person, to reduce spam

A

CAPTCHA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

organization that issues digital certificates to individuals and companies

A

Certificate Authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

result of encrypting plaintext

A

ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

UK law governing criminal offenses committed using a computer

A

Computer Misuse Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

another word for hacking

A

cracking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

flooding a computer system with data so that it cannot respond to genuine users

A

Denial of Service Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

attempt to break a password by trying all possible words

A

dictionary attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

technique used to authenticate remote users, such as online shopping businesses

A

digital signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

denial of service attack committed using dozens of computers, usually zombies on a botnet

A

Distributed Denial of Service attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

technique used by criminals to alter domain name system (DNS) records and drive users from faking sites to committing phishing

A

DNS poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

program which automatically downloads when a user visits a webpage, usually without their knowledge or consent

A

drive-by download

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

system of encoding plaintext so that it cannot be understood with access to an encryption key

A

encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

used to encrypt and decrypt data

A

encryption key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Extended Validation SSL; digital certificate validation technique used on the world wide web

A

EV SSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

when a system incorrectly rejects an action instead of accepting it

A

false negative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
when a system incorrectly accepts an action instead of rejecting it
false positive
26
system that encrypts all data saved to a hard disk automatically and transparently
full disk encryption
27
gaining illegal access to a computer system
hacking
28
directory that contains a users personal files
home directory
29
secure version of HyperText Transfer Protocol (HTTP) which offers encrypted communication
HTTPS
30
stealing personal data in order to impersonate a person
identity theft
31
idea of having encryption keys stored by a third party company so the government can access them if needed
key escrow
32
software or hardware which records all key strokes on a computer system
key logger
33
a public key and private key that work together in a public encryption system
key pair
34
virus that takes advantage of the macro programming languages built into some software
macro virus
35
generic name for malicious software
malware
36
use of several authentication techniques together, such as passwords and security tokens
multi-factor authentication
37
password generated by a security token, which expires as soon as it is used
one time password
38
software or hardware used to collect data traveling over a network
packet sniffer
39
another word for password
passphrase
40
word or phrase used to authenticate a user
password
41
another word for DNS poisoning
pharming
42
use of fake emails and web sites to trick users into revealing sensitive data
phishing
43
locks, alarms, and other techniques used to secure a building or computer room
physical security
44
message before it is encrypted, or after it has been decrypted
plaintext
45
key used for decryption in a public key encryption system
private key
46
key used for encryption in a public key encryption system
public key
47
user with full control over a computer system
root user
48
type of malware which infiltrates the operating system and attempts to hide itself from view
rootkit
49
encryption system in which a single key is used for both encryption and decryption
secret key encryption
50
system used to encrypt https web traffic
Secure Socket Layer / Transport Layer Security
51
hardware device that must be present during login to authenticate a user
security token
52
software update to fix a security problem discovered in software
security update
53
phishing attacks committed using text messages (SMS)
smishing
54
tricking a user into revealing their password or other sensitive data
social engineering
55
unwanted, bulk email
spam
56
program that scans web pages for email address, in order to send spam
spam bot
57
program designed to identify and block spam messages while letting genuine messages through
spam filters
58
malware which covertly records a user's actions, such as their key presses
spyware
59
another word for secret key encryption
symmetric key encryption
60
person in overall charge of a computer system in an organization
system administrator
61
malware which pretends to be a genuinely useful program to trick the user into using it
Trojan horse
62
gaining illegal access to a computer system
unauthorized access
63
computer program which damages files and data spreads when infected programs are copied
virus
64
used by anti-virus programs to recognize known viruses
virus definition file
65
phishing attacks committed using telephone calls or VoIP systems
vishing
66
software to scan a system for potential security problems
vulnerability scanner
67
technique used by spammers to detect if an email address is valid or not
web bug
68
Wired Equivalence Protocol; wireless network encryption system
WEP
69
malicious software which replicates itself and spreads between computer systems and over networds
worm
70
Wireless Protected Access; wireless network encryption system
WPA
71
Wireless Protected Access 2; wireless network encryption system
WPA2
72
computer which has been compromised by malware and is part of a botnet
zombie