Shared Flashcard Set

Details

Chapter 9
Exam 3
96
Other
Undergraduate 4
12/02/2009

Additional Other Flashcards

 


 

Cards

Term
Threat Environment
Definition
the sum of all threats facing the corporation
Term
Compromise
Definition
a successful attack
Term
Incident
Definition
a successful attack
Term
Breach
Definition
a successful attack
Term
Viruses
Definition
pieces of executable code that attach themselves to other programs. Within a computer, whenever an infected program runs (executes), the virus attaches itself to other programs
Term
Antivirus programs
Definition
scan arriving files for viruses and other malware
Term
Malware
Definition
evil software
Term
Worms
Definition
attack programs that propagate on their own by seeking out other computers, jumping to them, and installing themselves
Term
Vulnerability-enabled
Definition
worms that exploit vulnerability in software
Term
Payload
Definition
a piece of code that can be executed by a virus or worm after it has spread to multiple machines (in war, when a bomber reaches its target, it releases its payload of bombs)
Term
Trojan horse
Definition
a program that looks like an ordinary system file, but continues to exploit the user indefinitely
Term
Spyware
Definition
that sits on a victim’s machine and gathers information about the victim
Term
Surreptitiously
Definition
done without someone’s knowledge, such as surreptitious face recognition scanning
Term
Keystroke loggers
Definition
spyware that records your keystrokes, looking for passwords, social security numbers, and other information that can help the person who receives the keystroke logger’s data commit fraud
Term
Data Mining
Definition
spyware that searches your hard drive for potentially useful information and sends it to the attacker
Term
Social Engineering
Definition
tricking people into doing something to get around security protections
Term
Spam
Definition
unsolicited commercial e-mail
Term
Phishing
Definition
social engineering attack that uses an official-looking e-mail message or website
Term
Carder
Definition
someone who steals credit card numbers
Term
Identity theft
Definition
stealing enough information about a person to impersonate him or her in complex financial transactions
Term
Hacking
Definition
intentionally using a computer resource without authorization or in excess of authorization
Term
Scanning
Definition
to try to determine a network’s design through the use of probe packets
Term
Probe Packets
Definition
a packet sent into a firm’s network during scanning; responses to the probe packet tend to reveal information about a firm’s general network design and about its individual computers—including their operating systems
Term
Exploit
Definition
break-in program; a program that exploits known vulnerabilities
Term
Vulnerability
Definition
a security weakness found in software
Term
Hacker Toolkit
Definition
a collection of tools which automate some tasks that the hacker will have to perform after the break-in
Term
Backdoor
Definition
a way back into a compromised computer that an attacker leaves open; it may simply be a new account or a special program
Term
Denial-of-Service (DoS)
Definition
the type of attack whose goal is to make a computer or a network unavailable to its users
Term
Distributed DoS (DDoS)
Definition
DoS attack in which the victim is attacked by many computers
Term
Bot
Definition
a type of malware that can be upgraded remotely by an attacker to fix errors or to give the malware additional functionality
Term
Virus writers
Definition
someone who creates viruses
Term
Script kiddie
Definition
an attacker who possesses only modest skills but uses attack scripts created by experienced hackers; dangerous because there are so many
Term
Disgruntled Employees
Definition
employee who is upset with the firm or an employee and who may take revenge through a computer attack
Term
Disgruntled ex-employees
Definition
former employee who is upset with the firm or an employee and who may take revenge through a computer attack
Term
Criminal attackers
Definition
an attacker who attacks with criminal motivation
Term
Cyberterror
Definition
a computer attack made by terrorists
Term
Cyberwar
Definition
a computer attack made by a national government
Term
Risk Analysis
Definition
the process of balancing threats and protection costs
Term
Comprehensive security
Definition
security in which all avenues of attack are closed off
Term
Access control
Definition
determining who may access each resource
Term
Minimum permissions
Definition
initially giving users only the permissions they absolutely need to do their jobs
Term
Defense in depth
Definition
the use of successive lines of defense to thwart attackers
Term
Access Control Plans
Definition
plans for controlling access to a resource
Term
Authentication
Definition
the requirement that someone who requests to use a resource must prove his or her identity
Term
Authorizations
Definition
permitting a person or program to take certain actions on a resource
Term
Auditing
Definition
collecting data about events to assess actions after the fact
Term
Supplicant
Definition
in authentication, the party trying to prove its identity to the verifier
Term
Verifier
Definition
the party requiring the applicant to prove his or her identity
Term
Credentials
Definition
proof of identity that an applicant can present during authentication
Term
Authentication server
Definition
use of a central authentication server helps provide consistent security by ensuring that all verifiers check credentials against the same authentication information
Term
Password
Definition
a secret keyboard string only the account holder should know; authenticates user access to an account
Term
Username
Definition
an alias that signifies the account that the account holder will be using
Term
Dictionary words, Names
Definition
a common word, dangerous to use for a password because it is easily cracked
Term
Cracked
Definition
correctly guessed
Term
Dictionary attack
Definition
a password-cracking attack in which an attacker tries to break a password by trying all words in a standard or customized dictionary
Term
Hybrid modes
Definition
password cracking, a mode that tries variations on common word passwords
Term
Brute force attacks
Definition
a password-cracking attack in which an attacker tries to break a password by trying all possible combinations of characters
Term
Password length
Definition
passwords should be at least eight characters long, and even longer passwords are highly desirable
Term
Digital certificate
Definition
a document that gives the name of a true party, that true party’s public key, and other information; used in authentication
Term
Digital certificate authentication
Definition
authentication in which each user has a public key and a private key. Authentication depends on the applicant knowing the true party’s private key; requires a digital certificate to give the true party’s public key
Term
Public key
Definition
a key that is not kept secret. Part of a public key-private key pair
Term
Private key
Definition
a key that only the true party should know. Part of a public key-private key pair
Term
Public key authentication
Definition
authentication in which each user has a public key and a private key. Authentication depends on the applicant knowing the true party’s private key; requires a digital certificate to give the true party’s public key
Term
Public key infrastructures
Definition
a total system (infrastructure) for public key encryption
Term
Biometrics
Definition
the use of bodily measurements to identify an applicant
Term
Fingerprint scanning
Definition
a form of biometric authentication that uses the applicant’s fingerprints
Term
Error rates
Definition
in biometrics, the normal rate of misidentification when the subject is cooperating
Term
Iris scanners
Definition
a form of biometric authentication that uses the colored part of the eye (iris)
Term
Face recognition
Definition
the scanning of passerby to identify terrorists or wanted criminals by the characteristics of their faces
Term
Firewall
Definition
a security system that examines each incoming packet. If the firewall identifies the packet as an attack packet, the firewall discards the packet and copies information about the discarded packet into a log file
Term
Provable attack packet
Definition
a packet that is provably an attack packet
Term
Firewall log file
Definition
file containing information about packets discarded by a firewall
Term
Ingress filtering
Definition
the filtering of traffic coming into a site from the outside
Term
Egress filtering
Definition
the filtering of traffic from inside a site going out
Term
Stateful firewall filtering
Definition
a firewall whose default behavior is to allow all connections initiated by internal hosts but to block all connections initiated by external hosts. Only passes packets that are part of approved connections
Term
Access control lists (ACLs)
Definition
an ordered list of pass/deny rules for a firewall or other device
Term
Intrusion Detection Systems (IDSs)
Definition
a security system that examines messages traveling through a network. IDSs look at traffic broadly, identifying messages that are suspicious. Instead of discarding these packets, IDSs will sound an alarm
Term
False positives
Definition
a false alarm; an apparent incident that proves not to be an attack
Term
Intrusion Prevention Systems (IPSs)
Definition
firewall system that uses sophisticated packet filtering methods to stop attacks
Term
Deep packet inspection
Definition
the examination of headers and messages at multiple layers in a packet
Term
Cryptographic system
Definition
a security system that automatically provides a mix of security protections, usually including confidentiality, authentication, message integrity, and replay protection
Term
Encryption
Definition
to mathematically process a message so that an interceptor cannot read the message
Term
Confidential
Definition
assurance that interceptors cannot read transmissions
Term
Ciphers
Definition
term for encryption methods
Term
Decrypt
Definition
conversion of encrypted ciphertext into the original plaintext so an authorized receiver can read an encrypted message
Term
Symmetric key encryption
Definition
family of encryption methods in which the two sides use the same key to encrypt messages to each other and to decrypt incoming messages. In bidirectional communication, only a single key is used
Term
Exhaustive search
Definition
cracking a key or password by trying all possible keys or passwords
Term
Electronic signature
Definition
a bit string added to a message to provide message-by-message authentication and message integrity
Term
Digital signature
Definition
a calculation added to a plaintext message to authenticate it
Term
Key-hashed Message Authentication Codes (HMACs)
Definition
electronic signature technology that is efficient and inexpensive but lacks non-repudiation
Term
Hardened
Definition
set up to protect itself, as a server or client
Term
Group Policy Objects (GPOs)
Definition
policies that govern specific types of resources on a domain
Term
Vulnerability Testing
Definition
testing after protections have been configure, in which a company or consultant attacks protections in the way a determined attacker would and notes which attacks that should have been stopped actually succeeded
Term
Forensic procedures
Definition
the collection of data in a form acceptable for presentation in a legal proceeding
Term
Computer Security Incident Response Team (CSIRT)
Definition
a team convened to handle major security incidents, made up of the firm’s security staff, members of the IT staff, and members of functional departments, including the firm’s legal department
Term
IT disaster recovery
Definition
recovering from a disaster that damages computer equipment or data
Supporting users have an ad free experience!