JMU CIS 425 Exam 1 Guide

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 192

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

193 Terms

1

Chief Information Security Officer (CISO)

This person reports directly to the CIO. This person is responsible for assessing, managing, and implementing security.

New cards
2

Security Manager

reports to the CISO and supervises technicians, administrators, and security staff

New cards
3

Security Administrator

Has both technical knowledge and managerial skills. Manages daily operations of security technology, and may analyze and design security solutions within a specific entity as well as identifying users' needs

New cards
4

Security Technician

The position of ____ is generally an entry-level position for a person who has the necessary technical skills.

New cards
5

Silver Bullet

An action that provides an immediate solution to a problem by cutting through the complexity that surrounds it.

New cards
6

Lack of Vendor Support

Some devices have no support from the company that made the device, meaning no effort is made to fix any found vulnerabilities.

New cards
7

End-of-Life Systems

Systems are so old that vendors have dropped all support for security updates, or else charge an exorbitant fee to provide updates.

New cards
8

Race Condition

Occurs when two concurrent threads of execution access a shared resource simultaneously, resulting in unintended consequences.

New cards
9

Zero Day Attack

An attacker finds a vulnerability and initiates an attack to take advantage of the weakness before users or security professionals are aware of the vulnerability. No days of warning ahead of a new threat.

New cards
10

What is the relationship between security and convenience?

Inverse; as security is increased, convenience is often decreased.

New cards
11

Goal of IS?

To ensure that protective measures are properly implemented to ward off attacks and prevent the total collapse of the system when a successful attack does occur.

New cards
12

3 extensions that must be protected over information?

Confidentiality, integrity, and availability

New cards
13

Threat Actor

A person or element that has the power to carry out a threat.

New cards
14

Risk

A situation that involves exposure to some type of danger.

New cards
15

Risk response techniques?

Accept, transfer, avoid, and mitigate

New cards
16

Stuxnet

Best hack of the decade. Worm is discovered in July 2010 which targeted industrial software and equipment.

New cards
17

Cyberterrorism

A premeditated, politically motivated attack against information, computer systems, computer programs, and data that results in violence.

New cards
18

Script Kiddies

Individuals who want to attack computers yet they lack the knowledge of computers and networks needed to do so. (They use open-source scripts)

New cards
19

Hactivists

A group that is strongly motivated by ideology.

New cards
20

Nation State Actors

State-sponsored attackers employed by a government for launching computer attacks against foes.

New cards
21

Advanced Persistent Threat (APT)

Attacks that use innovative tools to attack and once a system becomes infected ___ silently extracts data over a persistent period.

New cards
22

Brokers

Sell their knowledge of a vulnerability to other attackers or governments.

New cards
23

5 fundamental security principles...

-Layering

-Limiting

-Diversity

-Obscurity

-Simplicity

New cards
24

Layering

Creates a barrier of multiple defenses that can be coordinated to thwart a variety of attacks.

New cards
25

Limiting

Limiting access to information reduces the threat against it

New cards
26

Diversity

The layers must be different so that attackers cannot use the same technique to bypass the next layer.

New cards
27

Obscurity

Obscuring to the outside world what is on the inside makes attacks much more difficult.

New cards
28

Malware

Software that enters a computer system without the user's knowledge or consent and then performs an unwanted and harmful action.

New cards
29

Malware Traits?

Circulation, Infection, Concealment, Payload capabilities

New cards
30

Virus

Malicious computer code that reproduces itself on the same computer.

New cards
31

2 types of malware that have the primary trait of circulation?

Worms and viruses

New cards
32

What are armored viruses?

Those that go to great lengths to avoid detection.

New cards
33

Armored virus infection techniques?

Swiss cheese infection, mutation, and split infection

New cards
34

Swiss cheese infection

Virus code is encrypted and then decrypted into different pieces and injected throughout the infected program code.

New cards
35

Split Infection

Virus splits the malicious code into several parts and then these parts are placed at random positions throughout the program code.

New cards
36

Mutation

When a virus changes its internal code.

New cards
37

Worm

A malicious program that uses a computer network to replicate.

New cards
38

3 types of malware that have the primary trait of infection?

Trojans, ransomware, and crypto-malware

New cards
39

Trojan

Executable program advertised as performing one activity, but actually does something else.

New cards
40

Remote Access Trojan (RAT)

A Trojan that also gives the threat agent unauthorized remote access to the victim's computer by using specially configured communication protocols.

New cards
41

Ransomware

One of the fastest-growing types of malware. It prevents a user's device from properly and fully functioning until a fee is paid.

New cards
42

Crypto-malware

Encrypts all the files on a device so that none of them can be opened until a fee is paid.

New cards
43

Malware that has a primary trait of concealment?

Rootkit

New cards
44

Rootkit

program that hides in a computer and allows someone from a remote location to take full control of the computer

New cards
45

Malware designed to collect data?

Spyware, adware

New cards
46

Spyware

Tracking software that is deployed without the consent or control of the user. It secretly monitors users by collecting info without their approval by using computer's resources.

New cards
47

Keylogger

Nefarious spyware that silently captures and stores each keystroke that a user types on the computer keyboard.

New cards
48

Adware

Delivers advertising content in a manner that is unexpected and unwanted by the user.

New cards
49

Malware designed to delete data?

Logic bomb

New cards
50

Logic Bomb

Computer code that is typically added to a legitimate program but lies dormant until it is triggered by a specific logical event triggers it.

New cards
51

Backdoor

gives access to a computer, program, or service that circumvents normal security protections.

New cards
52

Bot

Infected robot computer that infects other computers. When hundreds, thousands, or millions of bot computers are gathered into a logical computer network, they create a botnet under the control of the bot herder.

New cards
53

Social Engineering

Means of gathering information for an attack by relying on the weaknesses of individuals.

New cards
54

Impersonation

Social engineering tactic to masquerade as a real or fictitious character and then play out the role of that person on a victim.

New cards
55

Phishing

Sending an email or displaying a web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information.

New cards
56

Spear Phishing

Targets specific users

New cards
57

Whaling

Instead of targeting smaller fish, this targets the big fish, namely, wealthy individuals or senior executives.

New cards
58

Vishing

Voice phishing; it is like phishing except that the victim enters confidential data by phone.

New cards
59

Spam

Unsolicited email that is sent to a large number of recipients.

New cards
60

Watering Hole Attack

Directed toward smaller group of specific individuals, such as the major executives working for a manufacturing company

New cards
61

Dumpster Diving

Involves digging through trash receptacles to find computer manuals, printouts, or password lists that have been thrown away

New cards
62

Tailgating

When an unauthorized individual enters a restricted-access building by following an authorized user.

New cards
63

Shoulder Surfing

Watching an authorized user enter a security code on a keypad.

New cards
64

Cryptography

Practice of transforming info so that it is secure and cannot be accessed by unauthorized parties.

New cards
65

Steganography

Hides the existence of data.

New cards
66

Encryption

Process of changing the original text into a scrambled message.

New cards
67

Plaintext

Unencrypted data that is input for encryption or is the output of decryption.

New cards
68

Ciphertext

Scrambled and unreadable output of encryption.

New cards
69

Cleartext

Readable data that is transmitted or stored in the clear and is not intended to be encrypted.

New cards
70

Plaintext data is put into a ___________, which consists of procedures based on a mathematical formula to encrypt or decrypt the data.

Cipher (cryptographic algorithm)

New cards
71

Substitution Cipher

Substitutes one character for another.

New cards
72

ROT13 Cipher

The entire alphabet is rotated 13 steps. A = N, B = O, and so on.

New cards
73

XOR Cipher

Based on the binary operation eXclusive OR that compares two bits. If the bits are different then 1 is returned. If they are identical then a 0 is returned.

New cards
74

Software relies on a ____________________ _____________ _________, which is an algorithm for creating a sequence of numbers whose properties approximate those of a random number.

Pseudorandom Number Generator

New cards
75

Diffusion

If a single character of plaintext is changed then it should result in multiple characters of the ciphertext changing.

New cards
76

Confusion

The key does not relate in a simple way to the cipher text.

New cards
77

Cryptography provides these protections:

Confidentiality, integrity, authentication, non-repudiation, and obfuscation.

New cards
78

Non-repudiation

The process of proving that a user performed an action.

New cards
79

Obfuscation

Making something obscure or unclear.

New cards
80

What is the concept of security through obscurity?

The notion that virtually any system can be made secure so long as outsiders are unaware of it or how it functions.

New cards
81

Data-in-use

Data actions being performed by "endpoint devices"

New cards
82

Data in-transit

Actions that transmit the data across a network, like an email sent across the Internet.

New cards
83

Data at-rest

Data that is stored on electronic media.

New cards
84

(True/False) Is it important that there be high resiliency in cryptography?

True; high resiliency is the ability to quickly recover from resource vs security constraints.

New cards
85

Stream Cipher

Takes one character and replaces it with one character.

New cards
86

Block Cipher

Manipulates an entire block of plaintext at one time.

New cards
87

Hash

Creates a unique digital fingerprint of a set of data. It is one-way as opposed to encryption, which is two-way.

New cards
88

Message Digest 5 (MD5)

Uses four variables of 32 bits each in a round-robin fashion to create a value that is compressed to generate the digest. Note: serious weaknesses have been identified with this so it is no longer suitable for use.

New cards
89

Secure Hash Algorithm (SHA)

Developed by the NSA and the NIST. Creates a digest that is 160 bits instead of 128 bits in length. It pads messages of less than 512 bits with zeros and an integer that describes the original length of message. Padded message is then processed through this algorithm to produce the digest.

New cards
90

Symmetric Cryptographic Algorithms

Uses the same single key to encrypt and decrypt a document. Also known as private key cryptography.

New cards
91

Data Encryption Standard (DES)

Uses a 56 bit key and was adopted by the U.S. government for encrypting non-classified information. Note: No longer considered suitable for use.

New cards
92

Triple Data Encryption Standard (3DES)

-Designed to replace DES

-Uses three rounds of encryption

-Ciphertext of first round becomes input for second

iteration

-Most secure versions use different keys used for

each round

-No longer considered the most secure symmetric algorithm

New cards
93

Advanced Encryption Standard (AES)

A symmetric cipher that was approved by the NIST in late 2000 as a replacement for DES. Performs 3 steps on every block (128 bits) of plaintext. Within each round, bytes are substituted and rearranged, and then special multiplication is performed based on the new arrangement. No attacks have been successful against this.

New cards
94

Asymmetric Cryptographic Algorithms

(public key cryptography) Uses two keys instead of one. These keys are mathematically related and are called the public key and private key.

New cards
95

Public Key

Known to everyone and can be freely distributed.

New cards
96

Private Key

Known only to the individual to whom it belongs.

New cards
97

When Bob wants to send a secure message to Alice, he uses (his or her key?) to encrypt the message

Alice's public key. Alice would then use her private key to decrypt it.

New cards
98

(True/False) Asymmetric encryption can work in both directions?

True

New cards
99

RSA

Most common asymmetric cryptography algorithm. Multiplies 2 large prime numbers to compute their product (n=pq). Then, a number e is chosen that is less than n and a prime factor to (p-1)(q-1). The values of e and d are the public and private exponents. Public key is the pair (n,e) while the private key is (n,d).

New cards
100

Elliptic Curve Cryptography (ECC)

Instead of using two large prime numbers as with RSA, this uses sloping curves. Users share one curve and one point on the curve. One user picks a secret random number and computes a public key based on a point on the curve; the other user does the same. Both users can now exchange messages because the shared public keys can generate a private key on this curve.

New cards

Explore top notes

note Note
studied byStudied by 344 people
752 days ago
5.0(2)
note Note
studied byStudied by 5 people
815 days ago
5.0(1)
note Note
studied byStudied by 138 people
970 days ago
5.0(1)
note Note
studied byStudied by 16 people
691 days ago
5.0(2)
note Note
studied byStudied by 35 people
861 days ago
5.0(1)
note Note
studied byStudied by 16 people
720 days ago
5.0(1)
note Note
studied byStudied by 31 people
521 days ago
5.0(1)
note Note
studied byStudied by 15 people
741 days ago
5.0(2)

Explore top flashcards

flashcards Flashcard (33)
studied byStudied by 9 people
757 days ago
5.0(1)
flashcards Flashcard (20)
studied byStudied by 4 people
543 days ago
5.0(3)
flashcards Flashcard (22)
studied byStudied by 57 people
708 days ago
4.5(2)
flashcards Flashcard (50)
studied byStudied by 5 people
554 days ago
5.0(1)
flashcards Flashcard (42)
studied byStudied by 12 people
485 days ago
5.0(1)
flashcards Flashcard (33)
studied byStudied by 1 person
694 days ago
5.0(1)
flashcards Flashcard (31)
studied byStudied by 23 people
780 days ago
5.0(1)
flashcards Flashcard (54)
studied byStudied by 18568 people
709 days ago
4.5(362)
robot