information security Flashcards

(73 cards)

1
Q

the quality or state of
being secure— to be free from danger

A

SECURITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

malware that comes with a downloaded file that a user
requests

A

Drive-by downloads

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

a computer program that has the ability to replicate or make copies of itself,
and spread to other files

A

Viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

malware that is designed to spread from computer to computer

A

Worms-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

malware that prevents you from accessing your computer or files and
demands that you pay a fine

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

appears to be benign, but then does something other than expected.
Often a way for viruses or other malicious code to be introduced into a computer system

A

Trojan horses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

feature of viruses, worms, and Trojans that allows an attacker to remotely access a compromised computer

A

Backdoors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

type of malicious code that can be covertly installed on a computer when
connected to the Internet.

A

Bot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

collection of captured bot computers

A

Botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

is a threat at both the client and the server levels, although servers
generally engage in much more thorough anti-virus activities than do consumers.

A

Malicious code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

program that installs itself on a computer, typically without the user’s informed consent

A

Potentially unwanted programs (PUPs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

a PUP that serves pop-up ads to your computer

A

Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  • a program that can monitor and change the settings of a user’s
    browser
A

Browser parasites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

a program used to obtain information such as a user’s keystrokes, e-mail,
instant messages, and so on

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

any deceptive, online attempt by a third party to obtain confidential information for
financial gain

A

Phishing -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

exploitation of human fallibility and gullibility to distribute
malware

A

Social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

an individual who intends to gain unauthorized access to a computer
system

A

Hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

within the hacking community, a term typically used to denote a hacker
with criminal intent

A

Crackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

cybervandalism and data theft for political purposes

A

Hacktivism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

-intentionally disrupting, defacing, or even destroying a site

A

Cybervandalism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

considered the good guys because they follow the rules when it comes to hacking into systems without permission and obeying responsible disclosure laws

A

white hat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

may have good intentions but might not disclose flaws for immediate fixes
prioritize their own perception of right versus wrong over what the law might say

A

gray hat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

considered cybercriminals; they don’t lose sleep over whether or not something is illegal or wrong
exploit security flaws for personal or political gain–or for fun

A

black hat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

common security threats

A

Malware
PUPs
Phishing
Hacking
Data breach
Sniffing
Insider attacks & unsecure software
Social network & mobile platform issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
types of malware
Drive-by downloads Viruses Worms Ransomware Trojan horses Backdoors Bot
26
types of PUPs
Adware Browser parasites Spyware
27
PUP stands for?
Potentially unwanted programs
28
types of phishing
Social engineering
29
types of hacking
Crackers Hacktivism Cybervandalism
30
types of data breach
Credit card fraud / theft Identity fraud Spoofing Pharming Spam
31
types of sniffing
Denial of Service (DOS) Attack Distributed Denial of Service (DDOS) Attack E-mail wiretaps
32
types of Insider Attacks & Unsecured Software
SQL injection attack Zero-day vulnerability
33
types of Social Network & Mobile Platforms
Vishing Smishing Madware
34
occurs when an organization loses control over its information to outsiders
Data breach
35
- is one of the most feared occurrences on the Internet. Fear that credit card information will be stolen prevents users from making online purchases in many cases
Credit card fraud / theft
36
-involves the unauthorized use of another person’s personal data for illegal
Identity fraud
37
involves attempting to hide a true identity by using someone else’s e-mail or IP address
Spoofing
38
automatically redirecting a web link to an address different from the intended one, with the site masquerading as the intended destination
Pharming
39
also referred to as link farms; promise to offer products or services, but in fact are just collections of advertisements
Spam
40
-flooding a website with useless traffic to inundate and overwhelm the network
Denial of Service (DOS) Attack
41
using numerous computers to attack the target network from numerous launch points
Distributed Denial of Service (DDOS) Attack
42
DOS stands for
Denial of Service
43
DDOS stands for
Distributed Denial of Service
44
is a type of eavesdropping program that monitors information traveling over a network
Sniffer
45
a method for recording or journaling e-mail traffic generally at the mail server level from any individual.
E-mail wiretaps
46
the largest financial threats to business institutions come not from robberies but from embezzlement by insiders
Insider Attacks
47
takes advantage of poorly coded web application software that fails to properly validate or filter data entered by a user on a web page
SQL injection attack
48
software vulnerability that has been previously unreported and for which no patch yet exists
Zero-day vulnerability
49
target gullible cell phone users with verbal messages to call a certain number
Vishing
50
exploit SMS/text messages
Smishing
51
innocent-looking apps that contain adware that launches pop-up ads and text messages on your mobile device
Madware
52
security management (technology solutions)
authentication procedures encryption network security protocols virtual private networks firewalls proxy servers intrusion detection/prevention automated software updates anti-virus software access controls`
53
information security
confidentiality integrity availability
54
threat to confidentiality
snooping traffic analysis
55
threat to integrity
modification masquerading replaying repudiation
56
threat to availability
denial of service
57
Protect devices, networks, programs, and data from attacks and unauthorized access – cyber realm
Cybersecurity
58
Protecting the information regardless of the realm – digital or analog
Information Security
59
a message in its natural format readable by an attacker; it is the original message or data
Plaintext
60
a message altered to be unreadable by anyone except the intended recipients.
Ciphertext –
61
– transforming the plaintext, under the control of the key
Encryption
62
it is the sequence that controls the operation and behavior of the cryptographic algorithm
Key
63
transforming the ciphertext back to the original plaintext
Decryption
64
Any character of plain text from the given fixed set of characters is substituted by some other character from the same set depending on a key
Substitution cipher
65
The Caesar Cipher is a substitution cipher, named after _____.
Julius Caesar
66
one which rearranges the order of the letters in the ciphertext (encoded text), according to some predetermined method, without making any substitutions.
transposition cipher
67
– the secret key is shared between two parties
Private key ciphers
68
the secret key is not shared and to parties can still communicate using public keys.
Public key ciphers
69
A common method to create session keys in a distributed manner. It provides a way for two parties to establish a shared secret key that only two parties know – even communicating over an insecure channel.
Diffie-Hellman Algorithm
70
components of Cryptographic system
Plaintext Ciphertext Encryption Key Decryption
71
types of cipher
Private key ciphers Public key ciphers
72
2 types of transposition cypher`
Rail fence cipher Row transposition ciphers
73