Chapter 7 Flashcards
Antivirus/Antispyware
Antivirus/Antispyware: A software that scans incoming data and evaluates the periodic state of the whole system
to detect threats of secret software that can either destroy data or inform a server of destructive software activity.
Biometrics
Biometrics: An access tool that scans a body characteristic, such as fi ngerprint, voice, iris, or head or hand
geometry.
Black Hat Hacker
Black hat hackers: The hackers who break into an organization’s Web sites or systems for their own gain or to
wreak havoc on a firm.
Challenge Question
Challenge question: The access tool to a computer account that prompts a user with a follow‐up question such as
“Model of first car?”
Cross-site scripting
Cross‐site‐scripting (XSS): The security breach involving booby traps that appear to lead users to their goal, but
in reality lead to a fraudulent site that requires a log‐in.
Deep Web
Deep Web: A large part of the Web that includes unindexed Web sites that are accessible only by a browser named
“Tor,” which guarantees anonymity and provides access to sites offering both legal and illegal items and services.
Encryption
Encryption: The translation of data into a code or a form that can be read only by the intended receiver. Data are
encrypted using a key or alphanumeric code and can be decrypted only by using the same key or code.
Evil Twin Connection
Evil twin connection: A bogus WiFi connection that appears to be genuine but is actually a counterfeit connection
that is set up to deceive people into providing information unwittingly
Firewall
Firewall: A security measure that blocks undesirable requests for entrance into a Web site and keeps those on the
“inside” from reaching outside.
Grey Hat Hacker
Grey hat hackers: The hackers who test organizational systems without any authorization and notify the IT staff
when they find a weakness.
Key Logger
Key logger: A type of surveillance device that hackers use to track keystrokes either through hardware (an unseen
thumb drive on a public computer) or software (i.e., a compromised Web site).
Mobile Device Management
Mobile device management: A type of security policy that focuses on bring your own device (BYOD) and is
related to permitted products and required connection methods.
Multifactor Authentication
Multifactor authentication: The use of two or more authorization methods to gain access to a computer system.
Phishing Attack
Phishing attack: A type of security breach in which a person receives a convincing e‐mail calling for a response
to a phony urgent situation or opportunity, with a link pretending to be a step towards performing the response.
Often the sender is an imposter and the response actually can lead to theft of identity information, account passwords, or monetary funds.
Security Education and Awareness (SETA)
Security education/training/awareness (SETA): The training to make business users aware of security policies
and practices and to build a security‐conscious culture
Social Media Management
Social media management: A type of security policy that provides rules about what can be disclosed on social
media, such as who can Tweet and how employees can identify themselves
Spoofing
Spoofing: A security breach in which a hacker counterfeits an Internet address.
Token
Token: A small electronic device that generates a new supplementary passkey at frequent intervals.
Weak Password
Weak password: A password such as “123456” that is easy to guess.
White Hat Hacker
White hat hackers: The hackers who break into a firm’s systems to uncover weaknesses.
Zero-day Threat
A zero-day threat (also sometimes called a zero-hour threat) is one that hasn’t been seen before and doesn’t match any known malware signatures. This makes it impossible to detect by traditional signature-matching solutions.
- In the Office of Personnel Management’s case, the security breach made many people vulnerable to this.
a) Loss of personal property
b) Inaccurate personal data
c) Identity theft
d) Loss of access to personal data
e) Credit card fees
Identity Theft
- When the Office of Personnel Management was hacked, all of the following are true except:
a) The hackers gained access to the building to steal the records
b) It took the Office of Personnel Management many months to detect the break-in
c) The hackers likely exploited a stolen password
d) The hackers did not need to escape in the blue turbocharged vehicle
e) None of the above (indicating that all are true)
a) The hackers gained access to the building to steal the records
- Many organizations and even consumers use this to control access to a network like the Internet, allowing only authorized traffic to pass.
a) Encryption
b) VPN
c) Firewall
d) Anonymizing tools
e) Filtering
c) Firewall