1/17
Flashcards about Cyber Terrorism, covering espionage, attacks, defenses, and tools.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
What is a growing concern as networks connect through the Internet?
Cyber terrorism
List three reasons why people engage in espionage.
Economic gain, grudge, and ideology
What approach should be used for information access to defend against espionage?
A need-to-know approach
What should be done with old disks/tape backups/CDs to defend against espionage?
They should be melted.
What should be done with terminated employees' PCs to defend against espionage?
They should be scanned carefully.
What should employees with access to sensitive data sign?
A nondisclosure statement
Give four examples of potential harm from terrorist attacks.
Direct economic damage, economic disruption, compromising sensitive/military data, and disrupting mass communications
What can result from an out-of-service e-commerce site?
Lost revenue from sales
What is the focus of general attacks in cyber terrorism?
Economic chaos
What is one defense strategy at the state and national level to prevent cyberterrorism?
Greater law enforcement attention to computer crimes
What is involved in propaganda, in the context of cyber terrorism?
Putting an undisclosed political spin on what claims to be objective news
How is public perception affected in information control?
By the amount and type of information available and the language used
What is the function of a packet sniffer?
It intercepts packets on a network or the Internet and copies their contents for analysis
Name one reason for using a packet sniffer.
To ensure packets are encrypted.
What is CommView?
Basic packet sniffing software that provides statistics regarding captured packets
What is EtherDetect?
A tool to study specific packets, simpler than CommView but without statistics or graphs
What is WireShark?
A free, easy-to-use packet analyzer with a GUI and filters to drill down on data
List four pieces of information provided by packet sniffers.
Source IP address, destination IP address, protocol of the packet, contents of the packet