Chapter 9 Flashcards

1
Q

people attack computers looking for _______ or trying to harm the ________

A
  • valuable data

- computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

6 steps that criminals use to attack info systems:

A

1) conduct reconnaissance
2) attempt social engineering
3) scan and map the target
4) research
5) execute the attack
6) cover tracks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

use of deception to obtain unauthorized access to info resources

A

social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

involves use of variety of automated tools that identify computers that can be remotely accessed and the type of software they are running

A

scan and map the target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

cover tracks by creating _______ they can use to obtain access if their initial attack is discovered

A

back doors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

unauthorized access, modifications, or use of an electronic device or some element of a computer system

A

hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

gaining control of a computer to carry out illicit activities without the user’s knowledge

A

hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

short for robot network

A

botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

is a powerful network of hijacked computers, called zombies, that are used to attack systems and spread malware

A

botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

installs software that responds to the hacker’s electronic instructions on unwitting PCs

A

bot herder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

are delivered in a variety of ways: trojans, emails, instant messages, tweets

A

bot herder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

use the combined power of the hijacked computers to mount a variety of internet attacks

A

bot herder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

bot toolkits and easy-to-use software are available on the internet, showing hackers how to create their own

A

botnets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

botnets are used to perform a _________ which is designed to make a resource unavailable to its users

A

denial-of-service attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

a trial-and-error method that uses software to guess info needed to gain access to a system

A

brute force attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

recovering passwords by trying every combination possible

A

password cracking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

software generates user IDs and password guesses using a dictionary of possible user Ids and passwords to reduce number of guesses required

A

dictionary attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

dictionary attacks are used by

A

spammers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

reuses usernames and passwords from other data breaches to try to breaking into other systems

A

credential recycling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

the best defense against brute force attacks (4)

A

1) monitoring system activity
2) longer and more complex passwords
3) limiting # of login attempts
4) using multifactor authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

simultaneously sending the same unsolicited message to many ppl at the same time often in attempt to sell something

A

spamming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

reduces the efficiency benefits of emailing and is also a source of many viruses, worms, and spyware programs

A

spamming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

making an electronic communication look as if someone else sent it to gain the trust of the recipient

A

spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

making an email appear as though it originated from a different source

A

email spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

displaying an incorrect number on a caller ID display to hide the caller’s identity

A

caller ID spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

creating Internet Protocol (IP) packets with a forged source IP address to conceal the identity of the sender or impersonate another computer system

A

IP address spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

using short messages to change the name or number a text message appears to come from

A

SMS spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

“phishing” is also referred to as

A

web-page spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

potential point of attack bcuz it prob contains flaws

A

vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

an attack between the time a new software vulnerability is discovered and the time a software developer releases a patch to fix the problem

A

zero-day attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

a vulnerability in dynamic web pages that allows an attacker to bypass a browser’s security mechanism and instruct the victim’s browser to execute the code

A

cross-site scripting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

happens when the amount of data entered into a program is greater than the amount of memory set aside to receive it

A

buffer overflow attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

inserting malicious code in input such that it is passed to and executed by an application program

A

SQL injection attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

the idea is to convince the application to run the code that it was not intended to execute by exploiting a database vulnerability

A

SQL injection attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

places a hacker between a client and a host and intercepts network traffic between them

A

man-in-the-middle attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

man-in-the-middle attacks are often called

A

session hijacking attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

are used to attack public-key encryption systems where sensitive and valuable info is passed back and forth

A

man-in-the-middle attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

pretending to be an authorized user to access a system

A

masquerading/impersonating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

using a neighbors wi-fi network is an example of

A

piggybacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

tapping into a communication line and electronically latching onto a legitimate user before the user enters a secure system

A

piggybacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

programming a computer to dial thousands of phone lines searching for dial-up modem lines

A

war dialing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

driving around looking for unprotected wireless networks

A

war driving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

attacking phone systems

A

phreaking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

most common reason for attacking ________ is to obtain free phone line access, transmit malware, and steal and destroy data

A

phone systems

45
Q

to protect systems from phreakers, use

A

voice firewalls

46
Q

using a small device with storage capacity to download unauthorized data (ex: iPod)

A

podslurping

47
Q

used to embezzle money a “salami slice” at a time from many different accounts

A

salami technique

48
Q

a type of salami technique where all interest calculations are cut at decimal places and excess decimals put into an account the perp controls

A

round-down fraud

49
Q

the theft of info, trade secrets, and intellectual property

A

economic espionage

50
Q

using the internet to spread false or misleading info (ex: antivaxxers on FB)

A

internet misinformation

51
Q

using the internet auction site to defraud another person

A

internet auction fraud

52
Q

seller using a false identity or partnering with someone to drive up bid prices is an example of

A

internet auction fraud

53
Q

seller failing to deliver the merchandise or deliver inferior products is an example of

A

internet auction fraud

54
Q

using the internet to pump up the price of a stock and then selling it

A

internet pump-and-dump fraud

55
Q

where investors are defrauded in cryptocurrency-related fraud schemes

A

cryptocurrency fraud

56
Q

fake initial coin offerings and fake exchanges and wallets are examples of

A

cryptocurrency fraud

57
Q

manipulating clock numbers to inflate advertising bills

A

click fraud

58
Q

the unauthorized copying or distribution of copyrighted software

A

software privacy

59
Q

techniques or psychological tricks used to get ppl to comply with the perp’s wishes in order to gain access to building, servers, computers, etc.

A

social engineering

60
Q

fraudsters take advantage of 7 human traits to entice a person to reveal info:

A

1) compassion
2) greed
3) sex appeal
4) sloth
5) trust
6) urgency
7) vanity

61
Q

assuming someone’s identity for economic gain

A

identity theft

62
Q

using an invented scenario to increase the likelihood that a victim will divulge info

A

pretexting

63
Q

is more than just a lie, as it involves creating legitimacy in the target’s mind that makes impersonation possible

A

pretexting

64
Q

creating a seemingly legitimate business, collecting personal info while making a sale and never delivering the product

A

posing

65
Q

sending an electronic message pretending to be an actual company and requesting verification or info, often including a warning with a negative consequence

A

phishing

66
Q

is similar to phishing, except that the victim enters confidential data by phone

A

vishing

67
Q

activities performed on stolen credit cards

A

carding

68
Q

redirecting website traffic to spoofed website

A

pharming

69
Q

pharming has the ability to target many ppl at a time through

A

domain spoofing

70
Q

is difficult to detect bcuz the user’s browser shows the correct website (when in reality its a spoofed website)

A

pharming

71
Q

setting up similarly named websites so that when users make typos, they are sent to an invalid site

A

Typosquatting / URL hijacking

72
Q

to stop Typosquatting, companies (3)

A

1) send a cease-and-desist letter
2) purchase the web address
3) file a lawsuit

73
Q

searching documents and records to gain access to confidential info

A

scavenging / dumpster diving

74
Q

looking over a person’s shoulder in a public place to get info, IDs and passwords

A

shoulder surfing

75
Q

the perp inserts a sleeve into an ATM that prevents the ATM from ejecting the card then perp approaches victim and pretends to help by tricking person into entering their PIN again

A

Lebanese looping

76
Q

Double swiping a credit card in a legitimate terminal or covertly swiping a credit card in a small, hidden, handheld card reader that records credit card data for later use

A

skimming

77
Q

planting a small chip that records transaction data in a legit card reader

A

chipping

78
Q

any software that is used to do harm

A

malware

79
Q

is NOT restricted to computers

A

malware

80
Q

is the result of installation or injection by a remote attacker

A

malware

81
Q

software secretly monitors and collects personal info about users and sends it to someone else

A

spyware

82
Q

info is gathered by logging keystrokes, monitoring websites visited, and scanning documents on the computer’s hard drive

A

spyware

83
Q

is especially problematic for companies with employees who telecommute or remotely access the network

A

spyware

84
Q

spyware that can pop banner adds on a monitor, collect info about the user’s web-surfing and spending habits, and forward it

A

adware

85
Q

these companies charge for each computer showing its ads

A

adware

86
Q

software that is malicious, is no benefit, and is sold using scare tactics

A

scareware

87
Q

scareware can be spotted by looking for (2)

A

1) scare tactics

2) poor English

88
Q

threatening to harm a company or person if specified amount of money isn’t paid

A

cyber-extortion

89
Q

man was threatened that he had to pay $50,000 or his clients info would be released. this is an example of

A

cyber-extortion

90
Q

locks you out of all your programs and data by encrypting them

A

ransomware

91
Q

software that records user keystrokes

A

keylogger

92
Q

a set of malicious computer instructions in an authorized and properly functioning program

A

Trojan horse

93
Q

parents use this software to monitor their kids’ computer usage and business use it to monitor employee activity

A

keylogger

94
Q

unlike in viruses and worms, the code doesn’t replicate itself

A

trojan horse

95
Q

gives the creator the power to control the victim’s computer remotely

A

trojan

96
Q

is a trojan horse that lies idle until triggered by specified date or time or message sent or not sent

A

time bomb / logic bomb

97
Q

a set of instructions that allows a user to bypass the system’s normal controls

A

trap door / back door

98
Q

used so programmers can modify programs during systems development and then remove them before the system is put into operation

A

trap door

99
Q

capture data from info packets as they travel over networks

A

packet sniffers

100
Q

used to hide the presence of trap doors, packet sniffers and keyloggers

A

rootkit

101
Q

a segment of self-replicating, executable code that attaches itself to a file or program

A

virus

102
Q

during replication, it spreads to other systems when the infected file/program is downloaded or opened

A

virus

103
Q

a self-replicating computer program similar to a virus

A

worm

104
Q

A virus is a segment of code hidden in or attached to a host program or executable file, whereas a worm is a

A

stand-alone program

105
Q

a virus requires a _______ to do something to replicate itself, but a worm ______ to send copies of itself to other network devices

A
  • human

- actively seeks

106
Q

infect and corrupt files or data on a targeted computer

A

virus

107
Q

harm networks

A

worms

108
Q

taking control of someone else’s phone to make of listen to calls, texts, forward victims calls, etc

A

bluebugging

109
Q

stealing contact lists, data, pictures on Bluetooth compatible phones

A

bluesnarfing