CHAPTER 6 Flashcards
(30 cards)
……….. explorer, risk taker, system innovator
Original meaning of hacker
……………..someone who gains unauthorized access to
computers and computer network
Modern meaning of hacker
Three other low-tech techniques for obtaining login names and passwords
are:
➢ Eavesdropping
➢ Dumpster diving
➢ Social engineering
………………….such as simply looking over the shoulder of a legitimate
computer user to learn his login name and password, is a common way that
hackers gain access to computers.
Eavesdropping
………………..means looking through garbage for interesting bits of
information. Companies typically do not put a fence around their dumpsters. In
midnight rummaging sessions, hackers have found user manuals, phone
numbers, login names, and passwords.
Dumpster diving
…………….refers to the manipulation of a person inside the organization
to gain access to confidential information. Social engineering is easier in large
organizations where people do not know each other very well.
Social engineering
Criminalizes wide variety of hacker-related activities
➢ Transmitting code that damages a computer
➢ Accessing any Internet-connected computer without authorization
➢ Transmitting classified government information
➢ Trafficking in computer passwords
➢ Computer fraud
➢ Computer extortion
…………. hijacking of an open Web session by capturing a user’s cookie
Sidejacking
T/F Sidejacking possible on unencrypted wireless networks because many
sites send cookies “in the clear”
T
……….Piece of self-replicating code embedded within another program (host)
Virus
How viruses spread?
➢ Diskettes or CDs
➢ Email
➢ Files downloaded from Internet
Antivirus Software Packages
➢ Allow computer users to detect and destroy viruses
➢ Must be kept up-to-date to be most effective
➢ Many people do not keep their antivirus software packages up
to-date
➢ Consumers need to beware of fake antivirus applications
………….. is a self-contained program that spreads through a computer
network by exploiting security holes in the computers connected to the
network
worm
Conficker Worm
–Appeared 2008 on Windows computers–Particularly difficult to eradicate–Millions of copies of worm are circulating–Purpose of worm still unknown
Another way malware may be downloaded without user’s knowledge–Problem appears on Web sites that allow people to read what others
have posted–Attacker injects client-side script into a Web site–Victim’s browser executes script, which may steal cookies, track user’s activity, or perform another malicious action
Cross-site Scripting
–Unintentional downloading of malware caused by visiting a
compromised Web site–Also happens when Web surfer sees pop-up window asking permission
to download software and clicks “Okay”–Google Anti-Malware Team says 1.3 percent of queries to Google’s
search engine return a malicious URL somewhere on results page
Drive-by Downloads
……………. A set of programs that provides privileged access to a computer
Rootkits
…………..Program that communicates over an Internet connection without user’s knowledge or consent
➢ Monitor Web surfing
➢ Log keystrokes
➢ Take snapshots of computer screen
➢ Send reports back to host computer
Spyware
………….Type of spyware that displays pop-up advertisements related
to user’s activity
Adware
Defensive Measures
–Security patches: Code updates to remove security vulnerabilities–Anti-malware
tools: Software to scan hard drives, detect files that
contain viruses or spyware, and delete these files
Firewall: A software application installed on a single computer that
can selectively block network traffic to and from that computer
………..Large-scale effort to gain sensitive information from gullible computer users
Phishing
……………Variant of phishing in which addresses chosen
selectively to target particular group of recipients
Spear-phishing
–Method of attacking a database-driven Web application with improper
security–Attack inserts (injects) SQL query into text string from client to application
–Application returns sensitive information
SQL Injection
…………Intentional action designed to prevent
legitimate users from making use of a computer service
–Denial-of-service attack