CHAPTER 6 Flashcards

(30 cards)

1
Q

……….. explorer, risk taker, system innovator

A

Original meaning of hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

……………..someone who gains unauthorized access to
computers and computer network

A

Modern meaning of hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Three other low-tech techniques for obtaining login names and passwords
are:

A

➢ Eavesdropping
➢ Dumpster diving
➢ Social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

………………….such as simply looking over the shoulder of a legitimate
computer user to learn his login name and password, is a common way that
hackers gain access to computers.

A

Eavesdropping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

………………..means looking through garbage for interesting bits of
information. Companies typically do not put a fence around their dumpsters. In
midnight rummaging sessions, hackers have found user manuals, phone
numbers, login names, and passwords.

A

Dumpster diving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

…………….refers to the manipulation of a person inside the organization
to gain access to confidential information. Social engineering is easier in large
organizations where people do not know each other very well.

A

Social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Criminalizes wide variety of hacker-related activities

A

➢ Transmitting code that damages a computer
➢ Accessing any Internet-connected computer without authorization
➢ Transmitting classified government information
➢ Trafficking in computer passwords
➢ Computer fraud
➢ Computer extortion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

…………. hijacking of an open Web session by capturing a user’s cookie

A

Sidejacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

T/F Sidejacking possible on unencrypted wireless networks because many
sites send cookies “in the clear”

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

……….Piece of self-replicating code embedded within another program (host)

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How viruses spread?

A

➢ Diskettes or CDs
➢ Email
➢ Files downloaded from Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Antivirus Software Packages

A

➢ Allow computer users to detect and destroy viruses
➢ Must be kept up-to-date to be most effective
➢ Many people do not keep their antivirus software packages up
to-date
➢ Consumers need to beware of fake antivirus applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

………….. is a self-contained program that spreads through a computer
network by exploiting security holes in the computers connected to the
network

A

worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Conficker Worm

A

–Appeared 2008 on Windows computers–Particularly difficult to eradicate–Millions of copies of worm are circulating–Purpose of worm still unknown

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Another way malware may be downloaded without user’s knowledge–Problem appears on Web sites that allow people to read what others
have posted–Attacker injects client-side script into a Web site–Victim’s browser executes script, which may steal cookies, track user’s activity, or perform another malicious action

A

Cross-site Scripting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

–Unintentional downloading of malware caused by visiting a
compromised Web site–Also happens when Web surfer sees pop-up window asking permission
to download software and clicks “Okay”–Google Anti-Malware Team says 1.3 percent of queries to Google’s
search engine return a malicious URL somewhere on results page

A

Drive-by Downloads

17
Q

……………. A set of programs that provides privileged access to a computer

18
Q

…………..Program that communicates over an Internet connection without user’s knowledge or consent

➢ Monitor Web surfing
➢ Log keystrokes
➢ Take snapshots of computer screen
➢ Send reports back to host computer

19
Q

………….Type of spyware that displays pop-up advertisements related
to user’s activity

20
Q

Defensive Measures

A

–Security patches: Code updates to remove security vulnerabilities–Anti-malware

tools: Software to scan hard drives, detect files that
contain viruses or spyware, and delete these files

Firewall: A software application installed on a single computer that
can selectively block network traffic to and from that computer

21
Q

………..Large-scale effort to gain sensitive information from gullible computer users

22
Q

……………Variant of phishing in which addresses chosen
selectively to target particular group of recipients

A

Spear-phishing

23
Q

–Method of attacking a database-driven Web application with improper

security–Attack inserts (injects) SQL query into text string from client to application

–Application returns sensitive information

A

SQL Injection

24
Q

…………Intentional action designed to prevent
legitimate users from making use of a computer service

A

–Denial-of-service attack

25
T/F Aim of a DoS attack is not to steal information but to disrupt a server’s ability to respond to its clients
T
26
............DoS attack launched from many computers, such as a botnet
Distributed denial-of-service attack
27
– well-known cyber crime incidents:
Jeanson James Ancheta: created a network of about 400,000 bots, including computers operated by the US Department of Defense. Adware companies, spammers, and others paid Ancheta for the use of these computers
28
Benefits of Online Voting
–More people would vote –Votes would be counted more quickly –No ambiguity with electronic votes –Cost less money –Eliminate ballot box tampering –Software can prevent accidental over-voting –Software can prevent under-voting
29
Risks of Online Voting
–More difficult to preserve voter privacy –More opportunities for vote selling –Obvious target for a DDoS attack –Security of election depends on security of home computers –Susceptible to vote-changing virus –No paper copies of ballots for auditing or recounts
30