module 5 Flashcards

(32 cards)

1
Q

how much will cybercrime cost the world economy by 2025

A

$10.5 trillion annually

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

costs of cyber crime

A

loss of revenue
stolen identities, intellectual property and trade secrets
damage to companies and individuals reputations
expense of enhancing and upgrading a compnays cyver security
loss of business info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

spyware

A

software gathers info about users while connected to the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

adware

A

form of spyware that collects info about the user to determine ads to display

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

phishing

A

sending fradulent emails that seem to come from legit sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

pharming

A

like phising but the official website of an org is hijacked by altering website IP address via a domain name system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

baiting

A

similar to phishing attacks but baiter gives recipient a promise (free software/giftcard)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

quid pro quo

A

Similar to baiting but involves a hacker requesting the exchange of critical data or login information in exchange for a service or prize

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SMSishing

A

technique that tricks user to download malware onto mobile devicei

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

vishing

A

using voice technology that tricks user into revealing important financial or personal info to unauthorized entities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

keystroke loggers

A

software or hardware devices that monitor and record keystrokes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

sniffing

A

capture and record network traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

spoofing

A

attempt to gain access to a network by posing as an authorized user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

computer fraud

A

unauthorized use of computer data for personal gain

denial of service attacks
identity theft
software piracy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

viruses

A

self propagating program code that is triggered by a specified time or event

attaches to other files continuously
transmitted through the network, email or mssg boards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

worms

A

indept programs that can spread without attaching a host programs

eats up computer resources
does not usually erase data

17
Q

trojan programs

A

contain code intended to disrupt a computer, network or website

hidden inside popular program
can erase data
do not replicate

18
Q

logic bombs

A

type of trojan program used to release a virus, worm, or other destructive code

triggered at certain tiem or event

19
Q

backdoors (or trapdoor)

A

programming routine built into a system

enables the designer or programmer to bypass security at a later time

20
Q

blended threats

A

combines characteristics of viruses, worms and malicious codes with vulnerabilities on networks

embedding malicious codes in the servers HTML files
sending unauthorized emails from compromised servers with a worm attachment

21
Q

rootkits

A

series of software tools that enable unauthorized access to computer or network system

22
Q

denial of service attack (DOS)

A

flood a network or server with service requests to prevent legitimate users access to the system

23
Q

distributed denial of service (DDoS)

A

thousands of computers work together to floor a website to cause it to fail

24
Q

botnet

A

network of computers and IoT devices infected with malicious software and controlled as a group

25
TDOS telephone DOS
high volumes of automated calls flood a target phone system, halting incoming and outgoing calls
26
social engineering
using people skills to trick others into revealing private ingo
27
comprehensive securirty system should have
acess controls data encryptions
28
biometric security measures
physiological element unique to a person that cannot be stolen, lost, copied or passed on to others.
29
thee main nonbiometric secuirty measures
callback modems firewalls intrusion detection systems
30
intrusion detection system
protects external and internal access placed in front of a firewall identifies attack signatures, traces pattersn and generates alarms
31
data encryption
transforms plaintext data into a scrambled form called ciphertext that cannot be read by others SSL TLS
32