Chapter 9 Flashcards

1
Q

Trademark:

A

a word, words, or a symbol legally registered as representing a company or a product,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Copyright:

A

represented by the © symbol, protects original works of authorship

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Patent:

A

signifies ownership of an invention for a limited time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Digital products:

A

they don’t make their money from physical assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is in the CIA triad?

A

Confidentiality

Integrity

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Confidentiality:

A

ensuring that private information stays that way

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Snooping (also called Sniffing):

A

occurs when the attacker captures network traffic and then looks for key pieces of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Protocol Analyzer:

A

lets administrators capture network traffic and analyze its contents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are five attacks on confidentiality?

A

Snooping

Eavesdropping

Wiretapping

Social engineering

Dumpster diving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Eavesdropping:

A

a low-tech attack method in which the attacker simply listens to a conversation to gain key information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Wiretapping:

A

occurs when the attacker places a bug to tap into the physical wire on which the communication traveled.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Social Engineering:

A

occurs when an attacker attempts to acquire information about you or your network and system by social means

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Phishing:

A

is a form of social engineering in which someone uses email to ask you for a piece of information that they are missing by making it look as if it is a legitimate request

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Spear phishing:

A

the attacker uses information that the target would be less likely to question because it appears to be coming from a trusted source.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Whaling:

A

phishing for “big” users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Shoulder surfing:

A

involves nothing more than watching someone when they enter their sensitive data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Screen filter:

A

directs the light from the display at a restricted angle so that anyone who isn’t viewing it straight on won’t be able to read it clearly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Dumpster diving:

A

people can go through the dumpster and steal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Integrity:

A

means that the data is accurate and consistent and from the indicated source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are the 4 threats to data integrity?

A

Man-in-the-middle attacks

Replay Attacks

Impersonation

Unauthorized Information Alteration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Man-in-the-middle Attack:

A

Someone secretly places something between a server and the client, and neither party is aware of it.

22
Q

Replay Attack:

A

the attacker captures information from a sender with the intent of using it later

23
Q

Impersonation:

A

pretending to be someone or something that you are not

24
Q

Unauthorized information alteration:

A

is an attack that can also come from internal sources

25
Availability:
means that the data is accessible when the user needs it
26
What are the two concerns of availability?
Denying Service Hardware Issues
27
Denial of Service (DoS):
flooding a server with a multitude of illegitimate connection request
28
Service outage:
any time a service is denied
29
Zombies or Bots:
infected systems being commanded across the Internet
30
Power outage:
a cause of service denial
31
Uninterruptible power supply (UPS):
A battery backup that a server plugs into
32
Physically securing your area prevents two types of problems:
Hardware Damage Hardware Theft
33
Kensington security slot (K-slot):
a type of lock that fits into a laptop slot and is attached to a wall or furniture to keep it secure.
34
Malware:
software designed to do harm to your computer
35
Exploits:
take advantage of flaws in the OS or an application
36
Worms:
used to transmit malware
37
Trojan Horses:
are applications that mask their true intent
38
Adware:
used to display unwanted advertisements
39
Spyware:
used to report on your computer and possibly steal data
40
Ransomware:
used to extract payments from the infected user
41
Rootkits:
conceal themselves on the host OS, allowing for full-control access of the computer at a later date
42
Backdoors:
open ports or other routes into your system
43
Keyloggers:
record every keystroke and then use that data for identity theft
44
Vulnerability:
exists when flaws in the programming create the potential for misuse, an attacker is aware of the flaw, and a tool or technique that the attacker can use to exploit that vulnerability for malicious purposes is readily available.
45
Exploit:
when criminals use a vulnerability to attack a system
46
Service pack:
a collection of critical updates
47
Virus:
a computer code that inserts itself into an executable file
48
Payload:
malware carried by a worm
49
Spam:
a flood of unsolicited messages that you receive electronically
50
Spambot:
spammers program this to send as much emails as possible
51
What is the framework for access control?
Authentication Authorization Accounting Auditing Nonrepuditaion
52
Authentication:
happens when the system being logged into validates that the user has proper credentials.