Week 4 (Ch. 8) Flashcards

(35 cards)

1
Q

what is cybercrime

A

illegal activity using computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what percentage of business report cybercrimes

A

12%

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what are the two types of cybercrime

A

technology as target of crime and technology used to commit crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is malware

A

‘malicious software’: program designed to steal or destroy data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what are viruses and worms

A

codes that replicate to destroy data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is spyware

A

software that gathers knowledge without users knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is ransomware

A

software that encrypts data and requires payment to access it again

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is a DoS (denial of service)

A

prevents web server from serving users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is a DDoS

A

multiple users send requests to crash service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is identity theft

A

criminal gains access and uses personal information without your knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is social engineering

A

criminals lure individuals into giving up personal information (scam calls)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is hacking

A

accessing someones computer without their permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is phishing

A

user receives email with fake link requiring user to input username and password for criminal to steal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is spoofing

A

criminals disguise themselves by modifying their IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is piracy

A

illegal copying and distribution/use of of software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is the information security triad

A

confidentiality: restricting access to those who are allowed to view information
integrity: information accessed has not been modified or altered
availability: information can be accessed and modified by anyone authorized to do so at a given time frame

17
Q

what is example of authentication using something they know

A

password, questions

18
Q

what is an example of authentication using something they have

19
Q

what is an example of authentication using something they are

A

physical characteristic: finger print

20
Q

what is multi factor authentication

A

combination of two or more factors above

21
Q

what is access control

A

determines which users are allowed to read, modify, add or delete information

22
Q

what is an access control list (ACL)

A

list of users who are able to perform specific actions

23
Q

what are role based access control (RBAC)

A

users are assigned to roles and roles are given ability to perform specific actions

24
Q

what is encryption

A

scrambles data so it is unreadable to those without public key

25
what is symmetric key encryption
two parties share encryption key
26
what is public key encryption
user must use public key to send message and receiver must use private key to view message
27
what are firewalls
protects servers by blocking packets that do not meet certain criteria
28
what are anti-virus programs
softwares that can be installed to detect and remove malicious programs
29
what are intrusion detection systems
identifies if network is being attacked
30
what are examples of physical security
locked doors, secured equipment, physical intrusion detection
31
what are the three sources of security problems
1) human error and mistakes 2) malicious human activity 3) natural events and disasters
32
what are the three types of security safegaurds
1) technical safeguards 2) data safeguards 3) human safeguards
33
what is a WAR room
office space with basic equipment, charged monthly subscription fee
34
what is a cold site
empty room or building used for recovery
35
what is a hot site
recovery location available 24/7