JMU CIS 425 Exam 1 Guide

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/192

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

193 Terms

1
New cards

Chief Information Security Officer (CISO)

This person reports directly to the CIO. This person is responsible for assessing, managing, and implementing security.

2
New cards

Security Manager

reports to the CISO and supervises technicians, administrators, and security staff

3
New cards

Security Administrator

Has both technical knowledge and managerial skills. Manages daily operations of security technology, and may analyze and design security solutions within a specific entity as well as identifying users' needs

4
New cards

Security Technician

The position of ____ is generally an entry-level position for a person who has the necessary technical skills.

5
New cards

Silver Bullet

An action that provides an immediate solution to a problem by cutting through the complexity that surrounds it.

6
New cards

Lack of Vendor Support

Some devices have no support from the company that made the device, meaning no effort is made to fix any found vulnerabilities.

7
New cards

End-of-Life Systems

Systems are so old that vendors have dropped all support for security updates, or else charge an exorbitant fee to provide updates.

8
New cards

Race Condition

Occurs when two concurrent threads of execution access a shared resource simultaneously, resulting in unintended consequences.

9
New cards

Zero Day Attack

An attacker finds a vulnerability and initiates an attack to take advantage of the weakness before users or security professionals are aware of the vulnerability. No days of warning ahead of a new threat.

10
New cards

What is the relationship between security and convenience?

Inverse; as security is increased, convenience is often decreased.

11
New cards

Goal of IS?

To ensure that protective measures are properly implemented to ward off attacks and prevent the total collapse of the system when a successful attack does occur.

12
New cards

3 extensions that must be protected over information?

Confidentiality, integrity, and availability

13
New cards

Threat Actor

A person or element that has the power to carry out a threat.

14
New cards

Risk

A situation that involves exposure to some type of danger.

15
New cards

Risk response techniques?

Accept, transfer, avoid, and mitigate

16
New cards

Stuxnet

Best hack of the decade. Worm is discovered in July 2010 which targeted industrial software and equipment.

17
New cards

Cyberterrorism

A premeditated, politically motivated attack against information, computer systems, computer programs, and data that results in violence.

18
New cards

Script Kiddies

Individuals who want to attack computers yet they lack the knowledge of computers and networks needed to do so. (They use open-source scripts)

19
New cards

Hactivists

A group that is strongly motivated by ideology.

20
New cards

Nation State Actors

State-sponsored attackers employed by a government for launching computer attacks against foes.

21
New cards

Advanced Persistent Threat (APT)

Attacks that use innovative tools to attack and once a system becomes infected ___ silently extracts data over a persistent period.

22
New cards

Brokers

Sell their knowledge of a vulnerability to other attackers or governments.

23
New cards

5 fundamental security principles...

-Layering

-Limiting

-Diversity

-Obscurity

-Simplicity

24
New cards

Layering

Creates a barrier of multiple defenses that can be coordinated to thwart a variety of attacks.

25
New cards

Limiting

Limiting access to information reduces the threat against it

26
New cards

Diversity

The layers must be different so that attackers cannot use the same technique to bypass the next layer.

27
New cards

Obscurity

Obscuring to the outside world what is on the inside makes attacks much more difficult.

28
New cards

Malware

Software that enters a computer system without the user's knowledge or consent and then performs an unwanted and harmful action.

29
New cards

Malware Traits?

Circulation, Infection, Concealment, Payload capabilities

30
New cards

Virus

Malicious computer code that reproduces itself on the same computer.

31
New cards

2 types of malware that have the primary trait of circulation?

Worms and viruses

32
New cards

What are armored viruses?

Those that go to great lengths to avoid detection.

33
New cards

Armored virus infection techniques?

Swiss cheese infection, mutation, and split infection

34
New cards

Swiss cheese infection

Virus code is encrypted and then decrypted into different pieces and injected throughout the infected program code.

35
New cards

Split Infection

Virus splits the malicious code into several parts and then these parts are placed at random positions throughout the program code.

36
New cards

Mutation

When a virus changes its internal code.

37
New cards

Worm

A malicious program that uses a computer network to replicate.

38
New cards

3 types of malware that have the primary trait of infection?

Trojans, ransomware, and crypto-malware

39
New cards

Trojan

Executable program advertised as performing one activity, but actually does something else.

40
New cards

Remote Access Trojan (RAT)

A Trojan that also gives the threat agent unauthorized remote access to the victim's computer by using specially configured communication protocols.

41
New cards

Ransomware

One of the fastest-growing types of malware. It prevents a user's device from properly and fully functioning until a fee is paid.

42
New cards

Crypto-malware

Encrypts all the files on a device so that none of them can be opened until a fee is paid.

43
New cards

Malware that has a primary trait of concealment?

Rootkit

44
New cards

Rootkit

program that hides in a computer and allows someone from a remote location to take full control of the computer

45
New cards

Malware designed to collect data?

Spyware, adware

46
New cards

Spyware

Tracking software that is deployed without the consent or control of the user. It secretly monitors users by collecting info without their approval by using computer's resources.

47
New cards

Keylogger

Nefarious spyware that silently captures and stores each keystroke that a user types on the computer keyboard.

48
New cards

Adware

Delivers advertising content in a manner that is unexpected and unwanted by the user.

49
New cards

Malware designed to delete data?

Logic bomb

50
New cards

Logic Bomb

Computer code that is typically added to a legitimate program but lies dormant until it is triggered by a specific logical event triggers it.

51
New cards

Backdoor

gives access to a computer, program, or service that circumvents normal security protections.

52
New cards

Bot

Infected robot computer that infects other computers. When hundreds, thousands, or millions of bot computers are gathered into a logical computer network, they create a botnet under the control of the bot herder.

53
New cards

Social Engineering

Means of gathering information for an attack by relying on the weaknesses of individuals.

54
New cards

Impersonation

Social engineering tactic to masquerade as a real or fictitious character and then play out the role of that person on a victim.

55
New cards

Phishing

Sending an email or displaying a web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information.

56
New cards

Spear Phishing

Targets specific users

57
New cards

Whaling

Instead of targeting smaller fish, this targets the big fish, namely, wealthy individuals or senior executives.

58
New cards

Vishing

Voice phishing; it is like phishing except that the victim enters confidential data by phone.

59
New cards

Spam

Unsolicited email that is sent to a large number of recipients.

60
New cards

Watering Hole Attack

Directed toward smaller group of specific individuals, such as the major executives working for a manufacturing company

61
New cards

Dumpster Diving

Involves digging through trash receptacles to find computer manuals, printouts, or password lists that have been thrown away

62
New cards

Tailgating

When an unauthorized individual enters a restricted-access building by following an authorized user.

63
New cards

Shoulder Surfing

Watching an authorized user enter a security code on a keypad.

64
New cards

Cryptography

Practice of transforming info so that it is secure and cannot be accessed by unauthorized parties.

65
New cards

Steganography

Hides the existence of data.

66
New cards

Encryption

Process of changing the original text into a scrambled message.

67
New cards

Plaintext

Unencrypted data that is input for encryption or is the output of decryption.

68
New cards

Ciphertext

Scrambled and unreadable output of encryption.

69
New cards

Cleartext

Readable data that is transmitted or stored in the clear and is not intended to be encrypted.

70
New cards

Plaintext data is put into a ___________, which consists of procedures based on a mathematical formula to encrypt or decrypt the data.

Cipher (cryptographic algorithm)

71
New cards

Substitution Cipher

Substitutes one character for another.

72
New cards

ROT13 Cipher

The entire alphabet is rotated 13 steps. A = N, B = O, and so on.

73
New cards

XOR Cipher

Based on the binary operation eXclusive OR that compares two bits. If the bits are different then 1 is returned. If they are identical then a 0 is returned.

74
New cards

Software relies on a ____________________ _____________ _________, which is an algorithm for creating a sequence of numbers whose properties approximate those of a random number.

Pseudorandom Number Generator

75
New cards

Diffusion

If a single character of plaintext is changed then it should result in multiple characters of the ciphertext changing.

76
New cards

Confusion

The key does not relate in a simple way to the cipher text.

77
New cards

Cryptography provides these protections:

Confidentiality, integrity, authentication, non-repudiation, and obfuscation.

78
New cards

Non-repudiation

The process of proving that a user performed an action.

79
New cards

Obfuscation

Making something obscure or unclear.

80
New cards

What is the concept of security through obscurity?

The notion that virtually any system can be made secure so long as outsiders are unaware of it or how it functions.

81
New cards

Data-in-use

Data actions being performed by "endpoint devices"

82
New cards

Data in-transit

Actions that transmit the data across a network, like an email sent across the Internet.

83
New cards

Data at-rest

Data that is stored on electronic media.

84
New cards

(True/False) Is it important that there be high resiliency in cryptography?

True; high resiliency is the ability to quickly recover from resource vs security constraints.

85
New cards

Stream Cipher

Takes one character and replaces it with one character.

86
New cards

Block Cipher

Manipulates an entire block of plaintext at one time.

87
New cards

Hash

Creates a unique digital fingerprint of a set of data. It is one-way as opposed to encryption, which is two-way.

88
New cards

Message Digest 5 (MD5)

Uses four variables of 32 bits each in a round-robin fashion to create a value that is compressed to generate the digest. Note: serious weaknesses have been identified with this so it is no longer suitable for use.

89
New cards

Secure Hash Algorithm (SHA)

Developed by the NSA and the NIST. Creates a digest that is 160 bits instead of 128 bits in length. It pads messages of less than 512 bits with zeros and an integer that describes the original length of message. Padded message is then processed through this algorithm to produce the digest.

90
New cards

Symmetric Cryptographic Algorithms

Uses the same single key to encrypt and decrypt a document. Also known as private key cryptography.

91
New cards

Data Encryption Standard (DES)

Uses a 56 bit key and was adopted by the U.S. government for encrypting non-classified information. Note: No longer considered suitable for use.

92
New cards

Triple Data Encryption Standard (3DES)

-Designed to replace DES

-Uses three rounds of encryption

-Ciphertext of first round becomes input for second

iteration

-Most secure versions use different keys used for

each round

-No longer considered the most secure symmetric algorithm

93
New cards

Advanced Encryption Standard (AES)

A symmetric cipher that was approved by the NIST in late 2000 as a replacement for DES. Performs 3 steps on every block (128 bits) of plaintext. Within each round, bytes are substituted and rearranged, and then special multiplication is performed based on the new arrangement. No attacks have been successful against this.

94
New cards

Asymmetric Cryptographic Algorithms

(public key cryptography) Uses two keys instead of one. These keys are mathematically related and are called the public key and private key.

95
New cards

Public Key

Known to everyone and can be freely distributed.

96
New cards

Private Key

Known only to the individual to whom it belongs.

97
New cards

When Bob wants to send a secure message to Alice, he uses (his or her key?) to encrypt the message

Alice's public key. Alice would then use her private key to decrypt it.

98
New cards

(True/False) Asymmetric encryption can work in both directions?

True

99
New cards

RSA

Most common asymmetric cryptography algorithm. Multiplies 2 large prime numbers to compute their product (n=pq). Then, a number e is chosen that is less than n and a prime factor to (p-1)(q-1). The values of e and d are the public and private exponents. Public key is the pair (n,e) while the private key is (n,d).

100
New cards

Elliptic Curve Cryptography (ECC)

Instead of using two large prime numbers as with RSA, this uses sloping curves. Users share one curve and one point on the curve. One user picks a secret random number and computes a public key based on a point on the curve; the other user does the same. Both users can now exchange messages because the shared public keys can generate a private key on this curve.