Section 4.4

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/26

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

27 Terms

1
New cards

risks of a computer connected to a network

Unauthorized access, vandalism, and malware attacks.

2
New cards

malware

Malicious software intentionally designed to damage computers, server, client, networks, or steal data.

3
New cards

software bug

Unintentional harm caused by errors in software.

4
New cards

virus

A program that inserts itself into host programs; executes when host runs, causing damage.

can perform degradations of portions of the operating system, erase large amounts of data, or corrup data and other programs.

5
New cards

worm

Autonomous program that spreads copies of itself across to other machines in a network and could result in detriment of individual machines or the operations of the network.

6
New cards

spyware

Software that secretly collects info (like passwords/credit cards) and reports to attacker.

7
New cards

phishing

Fraudulent attempt to obtain private info by posing as a legitimate entity.

obtains private information by simply asking for it.

8
New cards

denial-of-service (DoS) attack

a computer system can be attacked from other computers in a network

Overloads a computer with messages, suffocating network resources.

9
New cards

packet sniffing / MITM (man in the middle) attack

Attacker intercepts data traveling to or from the victim’s device including authentication credentials.

10
New cards

brute force attack

Attacker tries all possible password combinations until correct one is found.

variations are rainbow table attack and dictionary attack

11
New cards

dictionary attack

attacker uses an application and a large dictionary text file with just words.

when the program runs it tries identifying the password by trying hundreds or thousands of words per minute from that dictionary file.

12
New cards

rainbow table attack

In most applications, passwords are not stored in plain text like “PassW0rd” and are often stored as scrambled text, or hash values, similar to “298cde70c32a57b84d0a546fedbb2596.”

tries to identify the hash value of the password, then convert it back to plain text.

13
New cards

CIA Triad

Confidentiality (protecting data from unauthorized access), Integrity (ensuring data is accurate and untampered), Availability (making systems and information accessible to authorized users when needed).

14
New cards

balance in CIA triad

Focusing on one (e.g., confidentiality) may reduce another (e.g., availability).

15
New cards

strategic risk analysis

Balancing security tools/resources against risk and business priorities.

16
New cards

network security practices

Backups, permissions, digital signatures, penetration testing, vulnerability assessments.

17
New cards

white-hat hackers

ethical testers

18
New cards

information assurance

Ensures data availability, authenticated access, and integrity.

19
New cards

information security

Protects information from unauthorized access or distribution.

20
New cards

firewall

Blocks/filters traffic based on rules; separates trusted vs untrusted networks.

block outgoing messages with certain destination addresses

block incoming messages from untrustworthy sources.

21
New cards

proxy server

Intermediary software shielding clients from servers.

22
New cards

network auditing software

Monitors traffic (origin and volume) for anomalies and suspicious patterns.

proactively or reactively mitigates unwanted occurrences.

23
New cards

antivirus software

Detects and removes known viruses from the network.

24
New cards

encryption

Encodes data to keep it confidential even if intercepted.

25
New cards

Types of malware

viruses, worms, spyware, and phishing, etc.

26
New cards

Black-hat hackers

malicious attackers.

27
New cards

Business Email Compromise (BEC)

a social engineering scam where attackers impersonate trusted individuals or entities via email to trick employees into transferring funds, sharing sensitive data, or installing malware.