Info Tech Protection of Info Flashcards

1
Q

Types of Threats

A
  • Dos- Denial of Service - uses zombie computer
  • Session hijacking occurs when an attacker finds and uses a “session token” to gain access to a system. The hijack occurs after the user has authenticated himself/herself into the system. If the attack is successful, then the hacker has hijacked the session—gained access to the session under the guise of another user. It is possible that session masquerading can lead to a DoS attack, but they are not the same thing. Zombies take over computers full-time—not just for a session.
  • In a man-in-the-middle attack, a perpetrator establishes a connection between two devices and then pretends to be each party, thereby intercepting and interfering with messages between the parties.
  • A phish is deceptive request for information delivered via email.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Backdoor

A

A software program that allows an unauthorized user to gain access to the system by sidestepping the normal logon procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Masquerading.

A

An attacker identifies an IP address (usually through packet sniffing) and then attempts to use that address to gain access to the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Superzapping.

A

The use of powerful software to access secure information while bypassing normal controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Prototyping

A

Prototyping is the practice of rapid development of a system containing essential features for the purpose of eliciting user comments, which drive successive iterations of the prototype system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Change Control

A

The practice of authorizing changes, approving tests results, and copying developmental programs to a production library is program change control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Remittance Advices

A

Remittance advices help customers match payments with invoices. They are more likely to be used in complex businesses, such as construction and medical billing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Systems Development Life Cycle

A

The steps in the systems development life cycle are

  • analysis
  • design
  • build
  • test
  • implement
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Edit C heck

A

An edit check is a check on the accuracy of data as it is inputted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly