IA 2 - UNIT 2 Flashcards

(59 cards)

1
Q

It involves using the internet, intranet, extranet, or other networks to support business processes.

A

E-Business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  • Primarily refers to online buying, selling, marketing, and servicing products and services.
  • Includes payment and delivery of products/services online.
A

E-Commerce

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

phishing attack primary targets

A
  1. retail services
  2. financial institutions
  3. ISP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Identified privacy and security as significant
concerns.

A

2001 Study
(Udo)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Buyer concerns about website security remain
critical.

A

2014 Findings
(Hartono et al.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Importance of information security in e-commerce financial transactions.

A

2016 Emphasis
(Jotwani &
Dutta)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Types of Security
Threats

A
  1. Denial of Service (DoS)
  2. Spying Attacks
  3. Unauthorized Access
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Overloading servers to make services unavailable.

A

Denial of Service
(DoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Interception of sensitive information during transactions (e.g., man-in-the-middle attacks).

A

Spying Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You are gaining access to user accounts or sensitive data without permission.

A

Unauthorized Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Types of DoS Attacks

A
  1. DDoS
  2. Virus Infection
  3. Computer Worms
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  • Involves multiple compromised systems (botnets).
  • Often undetected by the owners of infected systems.
A

DDoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  • Deliberately corrupts or deletes data.
  • Spread via email attachments or downloads.
A

Virus Infection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Self-replicating does not necessarily damage
but consumes bandwidth.

A

Computer
Worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Types of Spying Attacks

A
  1. Sniffing
  2. Man in the Middle Attack
  3. Key Logging
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Applications or devices that read, monitor, and
capture network data exchanges.

A

Sniffing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

An attack where the attacker intercepts and
relays messages between two parties.

A

Man in the Middle Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

a spying attack that records
each user’s keystroke on a computer.

A

Keylogging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Consequences of Spying Attacks

Gaining access to sensitive information can lead to:

A
  1. Identity theft
  2. Financial fraud
  3. Corporate espionage
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

is an organized framework of concepts, beliefs, principles, policies, procedures, techniques, and measures that protect system assets against threats.

A

security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Methods Supporting the AIC Objectives

A
  1. Authentication
  2. Encryption
  3. Access Control
  4. Firewalls
  5. Intrusion Detection and Prevention
  6. Systems (IDPS)
  7. Message Digest/Checksum
  8. Honeypot
  9. Digital Signature & Certificate
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
  • Technologies that measure and analyze unique physiological or behavioral characteristics are used to verify or identify individuals.
  • These technologies are convenient, as they eliminate the need for cards or passwords, and they are unique to each person, making them a reliable form of authentication.
A

Biometrics for
Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Fingerprints were collected for bank verification
and mobile SIM registration.

A

Nigeria

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Bradesco Bank’s palm vein biometric ATM
system

24
Biometric identification database to reduce benefit fraud.
India
25
* The user provides biometric data via a sensor. * A template is created and stored.
Registration
26
Modes of Biometrics
1. Physical Biometrics 2. Behavioral Biometrics
27
* User provides biometric data again. * New template is generated and compared to the stored one. * Access granted or denied based on matching.
Authentication
28
Physical Biometrics
1. Fingerprints 1. Face Recognition 1. Hand Geometry 1. Iris Recognition 1. Palm Vein 1. Identification
29
Behavioral Biometrics
Keystroke dynamics
30
* Generates **profiles for network nodes based on sampled data.** * Identifies nodes with out-of-line profiles as potential attackers.
Bayes Probability Algorithm
31
**Sampling and anomaly detection** to monitor network nodes.
Kalutarage’s Approach
32
* Combines boosting techniques with **neural networks to improve the accuracy** and generality of intrusion detection. * Tran et al. [68]
Adaptive Boosting & Semiparametric Neural Networks
33
* Feng et al. [69] * A **hybrid method that mines network data** to detect anomalies and potential attacks.
State Vector Machine & Ant Colony Networks
34
Benefits of Machine Learning in Intrusion Detection
* Adaptive algorithms that learn and evolve with new attacks. * Real-time detection and response to anomalies. * Reduces manual analysis, increasing detection accuracy.
35
is a decentralized, transparent, and secure method for **managing transactions and data without intermediaries.**
Blockchain
35
Peer-to-Peer Security Using Blockchains
1. Immutability 2. Protection from Fraud 3. Cryptographic Hashing
36
Once a block is accepted and added to the chain, it cannot be altered.
Immutability
37
The blockchain structure and validation process prevent tampering and fraudulent transactions.
Protection from Fraud
38
SHA-256 provides a secure hash function, ensuring data integrity.
Cryptographic Hashing
39
Challenges in Blockchain Security
1. Anonymity Concerns 2. Scalability Issues
40
* **Bitcoin transactions are anonymous,** which may not be acceptable for traditional sectors like banking. * Solution: Modified blockchain models with knowable user identities.
Anonymity Concerns
41
Current implementations may face challenges scaling to accommodate larger numbers of transactions.
Scalability Issues
42
Peers in the network who validate new transactions by **solving cryptographic puzzles.**
Data Miners
43
Maps business processes, application systems, and network topologies against possible attacks and defenses.
Enterprise Security Model
44
As enterprises move to the cloud, network complexity increases, making security more challenging.
Cloud Complexity
45
service oriented security framework
1. authentication certificates 2. code filters 3. https 4. ids/ips 5. encryption 6. access control 7. seperate server for business data
45
JP Morgan Chase employs a multi-layered security model to protect its banking and financial data. This model includes **comprehensive business process mapping to identify potential vulnerabilities in financial transactions**, customer data, and infrastructure.
Enterprise Security Architecture
46
Three Phases of user education and engagement in information security
1. awareness 2. training 3. education
47
Basic understanding of security concepts.
Awareness
47
incorporating awareness, training, and education at different user levels. This includes regular employee security briefings, specialized IT training, and advanced education for cybersecurity staff.
Security Awareness Programs at NASA
47
In-depth knowledge for professionals working in security fields.
Education
47
Developing specific skills to handle security challenges.
Training
48
offers training materials and simulation tools to help organizations **educate employees and end-users about phishing attacks.** Their e-learning modules simulate real phishing scenarios to raise awareness and improve responses.
APWG’s Anti-Phishing Training
49
Methods of Delivering Security Awareness Training
1. E-learning 2. Content Coverage 3. Compliance
50
Mandatory online courses.
E-learning
50
Phishing awareness, password security, handling sensitive data
Content Coverage
50
Specific organizational **requirements for data security**
Compliance
51
Example of E-learning Training
1. Password Management Best Practices 2. Sensitive Data Handling Procedures 3. Phishing and Social Engineering 4. Compliance and Regulatory Awareness (e.g., GDPR, HIPAA).