Exam 1 Flashcards

(78 cards)

1
Q

OSI Layer “Please”

A
  1. Physical
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

OSI Layer “Do”

A
  1. Data Link
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

OSI Layer “Not”

A
  1. Network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

OSI Layer “Throw”

A
  1. Transport
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

OSI Layer “Sausage”

A
  1. Session
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

OSI Layer “Pizza”

A
  1. Presentation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

OSI Layer “Away”

A
  1. Application
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The name fo the Internet standards architecture is _________

A

TCP/IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

________ is a good option if an attack is aimed at a single server because it keeps transmission lines at least partially open for other communication.

A

Rate limiting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Threat Environment

A

The threat environment consists of the types of attackers and attacks that companies face

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Security Goals

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Confidentiality

A

Confidentiality means that people cannot read sensitive information, either while it is on the a computer or while it is traveling across a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Integrity

A

Integrity means that attackers cannot change or destroy information, either while it is on a computer or while it is traveling across a network. Or, at least, if information is changed or destroyed, then the receiver can detect the change or restore destroyed data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Availability

A

Abailability means that people who are authorized to use information are not prevented from doing so

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Compromises

A

Successful attacks (aka incidents, breaches)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Countermeasures

A

Tools used to thwart attacks (aka safeguards, protections, and controls)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Types of countermeasures

A

Preventative
Detective
Corrective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

PCI-DSS

A

Payment Card Industry-Data Security Standard
Rules for companies that accept credit card purchases
Has 12 requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Employees and ex-employees are dangerous because:

A

They have knowledge of internal systems
They often have teh permission to access systems
They often know how to avoid detection
Employees generally are trusted
(IT and especially IT security professionals are the greatest employee threats)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Employee sabotage

A

Destruction of hardware, software, or data

Plant time bomb or logic bomb on computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Employee hacking

A

hacking is intentionally accessing a computer without AUTHORIZATION or in excess of authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Employee financial threat

A

Misappropriation of assets

theft of money

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Employee theft of intellectual property (IP)

A

Copyrights, patents, and trade secrets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Employee extortion

A

Perpetrator tries to obtain money or other goods by threatening to take actions that would be against the victim’s interest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Employee internet abuse
Downloading pornography, which can lead to sexual harassment lawsuits and viruses. Downloading pirated software, music, and video, which can lead to copyright violation penalties. Excessive personal use of the internet at work
26
Employee carelessness
Loss of computers or data media containing sensitive information. Careless leading to the theft of such information
27
Malware
A generic name for "evil software"
28
Viruses
Programs that attach themselves to legitimate programs on the victim's computer Spread today primarily by email Also by instant messaging, file transfers, etc.
29
Worms
Full programs that do not attach themselves to other programs Like viruses, can send by email, IM, and file transfers. Direct-propagation worms can just from one computer to another without human intervention on the receiving computer and can therefore spread extremely rapidly.
30
Blended threats
Malware propagates in several ways -- like worms, viruses, compromised webpages containing mobile code, etc.
31
Payloads
Pieces of code that do damage Implementation by viruses and worms after propagation. Malicious payloads are design to do heavy damage.
32
Non mobile malware
Must be placed on the user's computer by hackers. Placed on computer by virus or worm as part of its payload. The victim can be enticed to download the program. Mobile code executed on a webpage can download the nonmobile malware
33
Trojan Horses definition
A program that replaces an existing system file, taking its name
34
Types of Trojan horses
Remote Access Trojans (RATs) -- Remotely control the vicim's PC Downloaders
35
Downloader (THs)
Smal Trojan horses that download larger Trojan horses after the downloader is installed
36
Trojan horses: Spyware
Programs that gather information about you and make it available to the adversary. Cookies that store too much sensitive personal information. Keystroke loggers. Password-stealing spyware. Data mining spyware
37
Trojan horses: Rootkits
Take control of the supper user account (root, administrator, etc.). Can hide themselves from file system detection. Can hide malware from detection. Extremely difficult to detect
38
Mobile Code
Executable code on a webpage. Code is executed automatically when webpage is downloaded. Javascript, etc.
39
Social engineering
Social engineering is attempting to trick users into doing something that goes against security policies
40
Types of malware used in social engineering
Spam Phishing Spear phishing (aimed at individuals or groups) Hoaxes
41
Traditional hackers
Motivated by thrill, validation of skills, sense of power, to increase reputation among other hackers. Often do damage as a byproduct. Often engage in petty crime.
42
Anatomy of a hack
``` Reconnaissance probes The exploit (specific attack method used) ```
43
Chain of attack computers
attacker goes through a chain of victim computers
44
Denial of Service (DoS) attacks
Make a server or network unavailable to legitimate users. | Typically send a flood of attack messages to victim
45
Hacker Skill Levels
Expert | Script kiddies
46
PCI-DSS
Payment Card Industry-Data Security Standard | Rules for companies that accept credit card purchases
47
Employees and ex-employees are dangerous because:
They have knowledge of internal systems They often have teh permission to access systems They often know how to avoid detection Employees generally are trusted (IT and especially IT security professionals are the greatest employee threats)
48
Employee sabotage
Destruction of hardware, software, or data | Plant time bomb or logic bomb on computer
49
Employee hacking
hacking is intentionally accessing a computer without AUTHORIZATION or in excess of authorization
50
Employee financial threat
Misappropriation of assets | theft of money
51
Employee theft of intellectual property (IP)
Copyrights, patents, and trade secrets
52
Employee extortion
Perpetrator tries to obtain money or other goods by threatening to take actions that would be against the victim's interest
53
Employee internet abuse
Downloading pornography, which can lead to sexual harassment lawsuits and viruses. Downloading pirated software, music, and video, which can lead to copyright violation penalties. Excessive personal use of the internet at work
54
Employee carelessness
Loss of computers or data media containing sensitive information. Careless leading to the theft of such information
55
Malware
A generic name for "evil software"
56
Viruses
Programs that attach themselves to legitimate programs on the victim's computer Spread today primarily by email Also by instant messaging, file transfers, etc.
57
Worms
Full programs that do not attach themselves to other programs Like viruses, can send by email, IM, and file transfers. Direct-propagation worms can just from one computer to another without human intervention on the receiving computer and can therefore spread extremely rapidly.
58
Blended threats
Malware propagates in several ways -- like worms, viruses, compromised webpages containing mobile code, etc.
59
Payloads
Pieces of code that do damage Implementation by viruses and worms after propagation. Malicious payloads are design to do heavy damage.
60
Non mobile malware
Must be placed on the user's computer by hackers. Placed on computer by virus or worm as part of its payload. The victim can be enticed to download the program. Mobile code executed on a webpage can download the nonmobile malware
61
Trojan Horses definition
A program that replaces an existing system file, taking its name
62
Types of Trojan horses
Remote Access Trojans (RATs) -- Remotely control the vicim's PC Downloaders
63
Downloader (THs)
Smal Trojan horses that download larger Trojan horses after the downloader is installed
64
Trojan horses: Spyware
Programs that gather information about you and make it available to the adversary. Cookies that store too much sensitive personal information. Keystroke loggers. Password-stealing spyware. Data mining spyware
65
Trojan horses: Rootkits
Take control of the supper user account (root, administrator, etc.). Can hide themselves from file system detection. Can hide malware from detection. Extremely difficult to detect
66
Mobile Code
Executable code on a webpage. Code is executed automatically when webpage is downloaded. Javascript, etc.
67
Social engineering
Social engineering is attempting to trick users into doing something that goes against security policies
68
Types of malware used in social engineering
Spam Phishing Spear phishing (aimed at individuals or groups) Hoaxes
69
Traditional hackers
Motivated by thrill, validation of skills, sense of power, to increase reputation among other hackers. Often do damage as a byproduct. Often engage in petty crime.
70
Anatomy of a hack
``` Reconnaissance probes The exploit (specific attack method used) ```
71
Chain of attack computers
attacker goes through a chain of victim computers
72
Denial of Service (DoS) attacks
Make a server or network unavailable to legitimate users. | Typically send a flood of attack messages to victim
73
Hacker Skill Levels
Expert | Script kiddies
74
Federal Trade Commission (FTC)
Can punish companies that fail to protect private information
75
MSSPs
Managed SEcurity Service Providers | Outsource most IT security functions to the MSSP
76
Risk analysis
Goal: reasonable risk Risk analysis weighs probable cost of compromises vs. cost of countermeasures. Security has negative side effects that must be weighed: cost, convenience, efficiency
77
Single Loss expectancy (SLE)
``` Asset Value Exposure factor (percentage loss in asset value if a compromise occurs) AV*EF=SLE ```
78
Annualized Loss Expectancy (ALE)
SLE*Annualized rate of occurrence(ARO) | = ALE (expected loss per year from this type of compromise)