chapter 6info system security CS3 Flashcards

1
Q

Internet and Network Attacks

Malware,

A

short for malicious software, consists of programs that act without a user’s knowledge and deliberately alter the operations of computers and mobile devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Internet and Network Attacks

firewall

A

is hardware and/or software that protects a network’s resources from intrusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Internet and Network Attacks

Spoofing

A

is a technique intruders use to make their network or Internet transmission appear legitimate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Internet and Network Attacks:

Back Door

A

is a program that allow users to bypass security controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Internet and Network Attacks

denial of service attack (DoS attack)

A

disrupts computer access to an Internet service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Internet and Network Attacks

TAntivirus

A

software is a set of utility programs that looks for and eradicates a wide spectrum of problems such as viruses, Trojan horses, and worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Internet and Network Attacks

Trojan horse

A

s not a virus. It is a destructive program that looks as a genuine application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Internet and Network Attacks

worm:

A

s similar to a virus by its design, and is considered to be a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any help from a person.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Internet and Network Attacks

WHAT DOES A VIRUS DO?

A

A virus can perform a trigger event: corrupt and/or destroy data display an irritating message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Internet and Network Attacks

computer virus:

A

s a program that attaches itself to a file, reproduces itself, and spreads to other files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Unauthorized Access and Use

A

A unauthorized access is the use of a computer or network without permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Access controls define

A

who can access a computer, device, or network; when they can access it; and what actions they can take while accessing it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

computer/device/network maintain an audit trail that records & File successful/unsuccessful access attempts OF WHAT?

A

USERN NAME

PASSWORD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Unauthorized Access and Use

biometric device?

A

authenticates a person’s identity by translating a BIO INFORMATION into a digital code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Unauthorized Access and Use:

Digital forensics?

A

evidence found on computers and networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Unauthorized Access and Use

possessed object?

A

is any item that you must possess, or carry with you, in order to gain access to a computer or computer facility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Unauthorized Access and Use

PIN?

A

personal identification number)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Unauthorized Access and Use

passphrase

A

is a private combination of words, often containing mixed capitalization and punctuation, associated with a user name that allows access to certain computer resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Information Theft:

secure site

A

A website that uses encryption techniques to secure its data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Information Theft - digital certificate

A

s a notice that guarantees a user or a website is legitimate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Information Theft - digital signature

A

is an encrypted code that a person, website, or organization attaches to an electronic message to verify the identity of the message sender

22
Q

Information Theft - Encryption

A

• the process of encoding a message, information, or data in such a way that only authorized parties can access it, prevents unauthorized access.

23
Q

Computer Ethics

code of conduct

A

is a written guideline that helps determine whether a specification is ethical/unethical or allowed/not allowed

24
Q

Ethics and Society

Green computing?

A

g involves reducing the electricity and environmental waste while using computers, mobile devices, and related technologies

25
Q

Ethics and Society

Digital rights management (DRM)?

A

is a strategy designed to prevent illegal distribution of movies, music, and other digital content

26
Q

Ethics and Society

copyright?

A

protects any tangible form of expression

27
Q

Ethics and Society:

Intellectual property RIGHTS of artist/works?

A

are the rights to which creators are entitled to their work

28
Q

Ethics and Society:

Intellectual property

A

unique and original ideas, inventions, art, writings, processes, company and product names, and logos

29
Q

Information Privacy

Web filtering:

A

software restricts access to specified websites/URL’s

30
Q

Information Privacy

Content filtering:

A

is the process of restricting access to certain material/content

31
Q

Information Privacy

Adware:

A

is a program that displays an online advertisement in a banner or pop-up window on webpages, email messages, or other Internet service

32
Q

Information Privacy

Spyware:

A

is a program placed on a computer or mobile device without the user’s knowledge that secretly collects information about the user.

33
Q

Information Privacy

Websites use cookies for a

variety of reasons:

A

Allow for personalization

 Store user names and/or passwords

 Assist with online shopping

 Track how often users visit a site

 Target advertisements

34
Q

Information Privacy

cookie

A

is a small text file that a web server stores on your computer

35
Q

Data Backup & Restore

EXPLAIN BACK UP PROCESS OF DATA

A

A backup is usually stored on a different storage medium from the original files

The exact steps that you follow depend on your backup equipment, your backup software, and your personal backup plan

36
Q

Data Backup & Restore

restore

A

data from a backup to the original storage medium or its replacement

37
Q

Data Backup & Restore

backup

A

is a duplicate of a file, program, or media that can be used if the original is lost, damaged, or destroyed

38
Q

CIA (CONFIDEVTIALITY INTEGRITY AVAILABILITY) Triad

A

Confidentiality, Integrity, and Availability is a model designed to guide policies for information security within an organization.

39
Q

CIA Triad

A

Confidentiality, Integrity, and Availability is a model designed to guide policies for information security within an organizati

40
Q

Confidentiality,

A

preserving authorized restrictions on access and disclosure, including a mean of protecting personal privacy and proprietary information;

41
Q

Integrity:

A

, guarding against improper information modification or destruction, includes ensuring information accuracy and authenticity

42
Q

Availability:

A

, ensuring timely and reliable access to and use of information.

43
Q

digital security risk

A

is any event or action that could cause a loss of or damage to a computer or mobile device hardware, software, data, information, or processing capability

44
Q

computer crime

A

Any illegal act involving the use of a computer

45
Q

cybercrime

A

is an online or Internet-based illegal act

46
Q

Hacker,

A

person who uses computers to gain unauthorized access to data.

47
Q

Cracker,

A

name given to hackers who break into

computers for criminal gain.

48
Q

Digital Security Risks

;Unethical employees

A

employees’ actions that don’t conform to the acceptable standards of business operations, failing to do what is right in every situation.

49
Q

Digital Security Risks

Script kiddies

A

is an unskilled individual who uses scripts or programs developed by others to attack computer systems and networks.

50
Q

Digital Security Risks

Cyberextortionist,

A

person who demands payment in order to prevent or stop attacks on an organization’s network, website or computer systems.

51
Q

Digital Security Risks

Cyberextortionist,

A

person who demands payment in order to prevent or stop attacks on an organization’s network, website or computer systems.