Week 4 (Ch. 8) Flashcards
(35 cards)
what is cybercrime
illegal activity using computer
what percentage of business report cybercrimes
12%
what are the two types of cybercrime
technology as target of crime and technology used to commit crime
what is malware
‘malicious software’: program designed to steal or destroy data
what are viruses and worms
codes that replicate to destroy data
what is spyware
software that gathers knowledge without users knowledge
what is ransomware
software that encrypts data and requires payment to access it again
what is a DoS (denial of service)
prevents web server from serving users
what is a DDoS
multiple users send requests to crash service
what is identity theft
criminal gains access and uses personal information without your knowledge
what is social engineering
criminals lure individuals into giving up personal information (scam calls)
what is hacking
accessing someones computer without their permission
what is phishing
user receives email with fake link requiring user to input username and password for criminal to steal
what is spoofing
criminals disguise themselves by modifying their IP address
what is piracy
illegal copying and distribution/use of of software
what is the information security triad
confidentiality: restricting access to those who are allowed to view information
integrity: information accessed has not been modified or altered
availability: information can be accessed and modified by anyone authorized to do so at a given time frame
what is example of authentication using something they know
password, questions
what is an example of authentication using something they have
key, card
what is an example of authentication using something they are
physical characteristic: finger print
what is multi factor authentication
combination of two or more factors above
what is access control
determines which users are allowed to read, modify, add or delete information
what is an access control list (ACL)
list of users who are able to perform specific actions
what are role based access control (RBAC)
users are assigned to roles and roles are given ability to perform specific actions
what is encryption
scrambles data so it is unreadable to those without public key