Shared Flashcard Set

Details

Information Security & Cyber Crime
Security
44
Computer Networking
Undergraduate 2
12/05/2011

Additional Computer Networking Flashcards

 


 

Cards

Term
Human Behavior
Definition
accounts for nearly 75% of all information security breaches in business today
Term
PII
Definition
Personally Identifiable Information
Term
Graham-Leach Bliley Act of 1999
Definition
GLBA protect information from financial institutions

Req notice of sharing policies and give the consumer the right to "opt-out" of the institution sharing their information
Term
Pretexting
Definition
The GLBA protexts against this social engineering attack
its the use of fraudulent docs to get the consumer to release info
Term
Telephone records and privacy protection act of 2006
Definition
Dunn pretended to be a company and got info. this act made it a federal crime for people to perform fraudulent tactics to get phone companies to release info
Term
Health Insurance Portability and Accountability Act of 1996
Definition
HIPPA req. hospitals and doctors to provide safeguards over their patients information.
Noncompliance fines up to 100,000 and 10yrs in jail
Term
Sarbanes-Oxley Act of 2002
Definition
SOX - result of scandals at enron, world come etc.
objective - corporate governance, and accurate financial disclosure
Companies have to submit andannual assesment of their financial auditing reports to the (sec) security exchange commission
Term
Security Exchange commission
Definition
gets audit reports from companies because of SOX
Term
Federal Info Management Act of 2002
Definition
ensure effectiveness of internet security
government wide oversight of information security risk
Term
Homeland Security Act of 2002
Definition
fed. responsibility to work ith the private sector, state and local gov and the public to protect the nations information
Term
Security Breach Notification Act
Definition
SB-1386 Ca's requirement for businesses to notify their customers if their personal information may have been exposed by and info sec.breach
(persons name + SS#,DL#,or financial ACCT #
Term
Choice Point
Definition
Sells information, gave fraud info of 163,000 people - 10million + 5million to settle the charges
Term
Payment Card Industry Data Security Standards
Definition
rules etc.
Term
The federal rules of civil procedure, rule 26
Definition
focuses on the discovery of electronic information rather than privacy info (keep records of employees emails and ims)
Term
Cyber Crime
Definition
continuum of illicit activities that compromise of threaten the use of electronic info, is, and computer networks
Term
Phone Phreaks
Definition
Mimic tones, use whistle from captain crunch, steve jobs and wozniac
Term
Malware
Definition
Malicious computer code that is software and intentionally designed to infiltrate or damage computer networks
Term
Storm Worm
Definition
Convinced users they were attacked and offered a remedy which was actually was the storm worm.
Term
worm
Definition
virus that propagates over network without user action to infect the computer
Term
Crackers
Definition
Malicious Hackers
Term
Slammer
Definition
Overloaded computer networks
Term
Trojan horse
Definition
Virus that presents itself as one program but is another
Term
Road Apple
Definition
Example of the flashdrives
Term
Rootkit
Definition
Program that establishes root access to a computer. similar to admin access - used to sustain computers injected with spyware
Term
Botnet
Definition
Network of computers that are all infected with a malware called a Bot
Term
Zombie
Definition
Individual computer in a botnet
Term
Bot herder
Definition
Person controlling the botnet
Term
Social Engineers
Definition
attack people and their weakness
Term
Denial of Service(DoS)
Definition
Might fill up the spaceandmakeacomputer unusable
Term
Distributed Denial of service DDoS
Definition
often carried out by zombies to attack a computer or network and overwhelm its resources
Term
Phishing
Definition
Relies on spoofed emails to get information - will link to a fake website
Term
Pharming
Definition
use dns cache to get the victims to a website and give their info
Term
DNS Cache Poisoning
Definition
Change their banks ip address and change it to a bogus website
Term
Drive by pharming
Definition
take control of dns server just by visiting the page (many say disable java script in browsers)
Term
Security Patch
Definition
Fixes vulnerability
Term
Zero Day Attacks
Definition
exploits that take advantage of vulnerabilities only known to hackers
Term
HoneyPot
Definition
used to entice and watch how cyber criminals and their malware behave, disguised as a normal network
Term
Public Key encryption
Definition
2 keys are required. info cannot be read by anyone but the receiver
Term
Secure Socket layer
Definition
Example is your signature on a check allowing it to be cashed.
Term
Authentication
Definition
Verify the identity of the person
Term
Bio-metrics
Definition
ID someone based on physiological or behavioral traids like fingerprints and eyes
Term
Possessed objects
Definition
Drivers license etc.
Term
Token based
Definition
plug into a computer, serial number and a shared secret
Term
Network Address Translation
Definition
used by firewalls to hide Ip addresses of LAN computers.
Supporting users have an ad free experience!