Chapter 21 - OMIS 3710

0.0(0)
studied byStudied by 5 people
0.0(0)
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/67

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 7:04 PM on 12/3/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

68 Terms

1
New cards

What four general categories of issues can amplify a firm's vulnerability to a security breach?

Personnel issues, technology problems, procedural factors, and operational issues.

2
New cards

The Equifax data breach exposed the personal information of how many consumers?

It exposed data on 143 million consumers, including some in the U.K. and Canada.

3
New cards

What was the critical failure that led to the Equifax data breach?

The firm failed at basic maintenance, leaving an easily preventable vulnerability unpatched for two months.

4
New cards

In the Target hack, how did attackers compromise the company's systems?

They installed malware in Target's security and payments system.

5
New cards

What were the major business consequences for Target following its massive data breach?

The firm experienced its largest ever decline in transactions, falling profits, numerous lawsuits, and the CEO's ouster.

6
New cards

A critical procedural failure at Target involved its FireEye security software; what did the security team do wrong?

They ignored warnings from the software and had turned off the function that automatically deletes malware upon detection.

7
New cards

According to the 'Timeline of a Breach' chart, what percentage of breaches achieve 'Point of Entry to Compromise' within minutes?

31% of breaches achieve initial compromise within minutes.

8
New cards

The time from an initial security compromise to its discovery takes _ for 37% of breaches.

months

9
New cards

What is the estimated average cost per stolen record in a data breach?

The cost is estimated at $145 to $154 per stolen record.

10
New cards

What is a primary financial motivation for hackers, as seen with the sale of stolen data from the Target breach?

To sell the stolen data; 2 million Target card numbers were sold for an average of $20 each.

11
New cards

A data package for sale on the Deep Web that includes a credit card number, SSN, and medical information is known as a _.

kit

12
New cards

What term describes cybercriminals who infiltrate systems to collect data for illegal resale?

Data harvesters.

13
New cards

What is the role of a 'cash-out fraudster' in the cybercrime ecosystem?

They purchase stolen assets from data harvesters to use for illegal financial gain, such as buying goods with stolen cards.

14
New cards

What is a botnet?

A horde of surreptitiously infiltrated computers that are controlled remotely by an attacker.

15
New cards

An attack where a firm's systems are flooded with thousands of legitimate-seeming requests to slow or shut down the site is called a _ attack.

distributed denial of service (DDoS)

16
New cards

What is a ransomware attack?

A type of attack where criminals infiltrate a network, encrypt the organization's data, and demand a ransom to provide the decryption key.

17
New cards

What is corporate espionage in the context of cybersecurity?

The theft of intellectual property or sensitive corporate data, which may be performed by insiders, rivals, or foreign governments.

18
New cards

What was the Stuxnet cyberattack?

A notorious act of cyberwarfare that infiltrated Iranian nuclear facilities and reprogrammed industrial control software for uranium-enriching centrifuges.

19
New cards

A protester who seeks to make a political point by leveraging technology tools, often through system infiltration or damage, is known as a _.

hacktivist

20
New cards

Who was Edward Snowden?

A former CIA employee and NSA contractor who leaked over 1.7 million digital documents, revealing the extent of government surveillance programs.

21
New cards

What is XKeyscore, as revealed by the Snowden leaks?

An NSA program that allows for the collection of data on 'nearly everything a user does on the Internet'.

22
New cards

What is the difference between a white hat hacker and a black hat hacker?

A white hat hacker uncovers weaknesses to improve security, while a black hat hacker is a computer criminal who exploits them.

23
New cards

In cybersecurity, what is a 'red team'?

A group employed by a firm to act like bad actors in an attempt to uncover weaknesses before they are exploited.

24
New cards

What is the function of a 'blue team' in cybersecurity?

A team of defensive security professionals responsible for maintaining internal network defenses against cyberattacks and threats.

25
New cards

What is social engineering?

Con games that trick employees into revealing sensitive information or performing tasks that compromise a firm's security.

26
New cards

What are 'bad apples' in the context of information security threats?

Rogue employees who steal secrets, install malware, or otherwise intentionally harm the firm from within.

27
New cards

What is phishing?

A type of con executed using technology to acquire sensitive information or trick someone into installing malicious software.

28
New cards

What distinguishes 'spear phishing' from general phishing?

Spear phishing attacks are highly targeted, specifically aiming at a given organization or a select group of users.

29
New cards

In a phishing email, a _ email address or link has been altered to forge or disguise its true origin or identity.

spoofed

30
New cards

What are 'deepfakes'?

Sophisticated media (audio, image, video) created by AI that attempts to look or sound like a real person or event, often used in scams.

31
New cards

The pejorative term for an unsophisticated hacker who relies on scripts or downloaded programs is a _.

script kiddie

32
New cards

What is an 'evil twin' WiFi attack?

A fraudulent WiFi access point that appears to be legitimate but is set up to eavesdrop on wireless communications.

33
New cards

What are biometrics in the context of authentication?

The measurement and analysis of human body characteristics, such as fingerprints or facial features, for identification or authentication.

34
New cards

When identity is proven by presenting more than one item for proof of credentials, it is called _ authentication.

multi-factor

35
New cards

What is a 'passkey'?

A passwordless authentication technology, often using biometrics on a user's device to gain access to a cryptographically secure access code.

36
New cards

What is public-key cryptography?

A security system where two keys are generated: a public key for encryption and a private key for decryption.

37
New cards

_ seeks to compromise a computing system without permission.

Malware

38
New cards

What type of malware infects other software or files?

A virus.

39
New cards

A type of malware that takes advantage of a security vulnerability to automatically spread without human intervention is called a _.

worm

40
New cards

What is a Trojan in the context of malware?

Malware that attempts to sneak onto a system by masquerading as something legitimate or harmless.

41
New cards

What is spyware?

Malware that secretly monitors user actions, network traffic, or scans for files.

42
New cards

A _ is a hardware or software tool that records a user's keystrokes.

keylogger

43
New cards

What is a card skimmer?

A physical device used to illegally capture data from a credit or debit card's magnetic strip.

44
New cards

What is RAM scraping or storage scanning software?

Malicious code that scans a computer's memory (RAM) or storage for sensitive data like credit card numbers.

45
New cards

What are 'blended threats'?

Cyberattacks that combine multiple types of malware or hacking exploits in a single attack.

46
New cards

What does it mean for a smartphone to be 'jail-broken'?

It has had its security restrictions overridden, often to use it on an unapproved network, making it more vulnerable to malware.

47
New cards

_ refers to combing through a person's or business's trash to identify valuable assets or information.

Dumpster diving

48
New cards

What is shoulder surfing?

The act of gaining compromising information, such as a password or PIN, through direct observation as someone enters it.

49
New cards

What is encryption?

The process of scrambling data using a code or algorithm, thereby hiding it from those who do not have the unlocking key.

50
New cards

A _ attack is an attempt to break into an account by systematically trying all possible password combinations.

brute-force

51
New cards

What is the ISO 27000 series (ISO27k)?

A series of information security standards that provide a model for establishing and maintaining an Information Security Management System (ISMS).

52
New cards

Why is it said that 'compliance does not equal security'?

Because merely meeting a set of legal or framework requirements (compliance) does not guarantee a firm is fully protected against all threats.

53
New cards

In the context of organizational security, what are 'patches'?

Software updates that are released by vendors to plug existing security holes in their products.

54
New cards

A _ is a security mechanism that controls network traffic, blocking unauthorized access while permitting outward communication.

firewall

55
New cards

What is the purpose of an intrusion detection system (IDS)?

To monitor network use for hacking attempts and take preventive action, such as blocking traffic or sending an alert.

56
New cards

In cybersecurity, what is a 'honeypot'?

A tempting, bogus target system meant to lure hackers in order to study their methods or distract them from real targets.

57
New cards

What is the difference between blacklists and whitelists in network security?

Blacklists deny entry to specific known-bad entities (like IP addresses), while whitelists permit communication only with pre-approved entities.

58
New cards

What are single sign-on (SSO) tools?

Tools that offer employees one very strong password that works across multiple applications, simplifying and centralizing password management.

59
New cards

How can AI be used defensively in cybersecurity?

AI can be used for threat detection by monitoring network patterns, performing vulnerability audits, and adapting to new threats as they emerge.

60
New cards

What is Microsoft's Security Copilot?

A generative AI tool specifically trained and updated on information security issues to assist cybersecurity professionals.

61
New cards

Which group of hackers acts as an authorized adversary to probe for an organization's security weaknesses?

A red team.

62
New cards

A phishing attack that specifically targets a given organization or group of users is called _ phishing.

spear

63
New cards

What is the primary purpose of a CAPTCHA?

To thwart automated account setup or ticket buying attempts by bots.

64
New cards

The FIDO Alliance is a consortium of firms working to create standards for technology called _.

passkey

65
New cards

What is the goal of extortion in a cyberattack?

To demand payment from the victim under the threat of releasing stolen data, continuing an attack, or keeping systems locked.

66
New cards

_ are malicious pranksters in the online world.

Griefers or trolls

67
New cards

According to a slide, what percentage of breaches are caused by a stolen password?

80% of breaches are caused by stealing a password.

68
New cards

Explore top flashcards

OMM II Terms (4)
Updated 1012d ago
flashcards Flashcards (40)
peds exam 1
Updated 739d ago
flashcards Flashcards (95)
Cognition 2
Updated 1044d ago
flashcards Flashcards (60)
Final practice
Updated 1157d ago
flashcards Flashcards (106)
EP Test 1
Updated 1158d ago
flashcards Flashcards (63)
E1T2: La familia
Updated 87d ago
flashcards Flashcards (74)
OMM II Terms (4)
Updated 1012d ago
flashcards Flashcards (40)
peds exam 1
Updated 739d ago
flashcards Flashcards (95)
Cognition 2
Updated 1044d ago
flashcards Flashcards (60)
Final practice
Updated 1157d ago
flashcards Flashcards (106)
EP Test 1
Updated 1158d ago
flashcards Flashcards (63)
E1T2: La familia
Updated 87d ago
flashcards Flashcards (74)