Cyberattacks and Cybersecurity - Chapter 3 (Original by LSUWaRRIOR)

studied byStudied by 1 person
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 54

flashcard set

Earn XP

Description and Tags

Please don't credit me. Original is by LSUWaRRIOR (https://quizlet.com/567656221/cyberattacks-and-cybersecurity-chapter-3-flash-cards/)

55 Terms

1

Making decisions regarding IT security involves weighing these three complex trade-offs:

#How much effort and money should be spent to safeguard against computer crime?

#What should be done if recommended IT security safeguards make conducting business more difficult, resulting in lost sales and increased costs?

#If a firm is a victim of a cybercrime, should it pursue prosecution of the criminals, maintain a low profile to avoid negative publicity, inform affected customers, or take some other action?

New cards
2

Why are computer incidents so prevalent?

#As more devices are added, the number of network entry points grows, increase security risks

#Expanding and changing systems introduce new risks, IT orgs must: keep up with tech. change, perform ongoing security assessments, and implement approaches for dealing with new risks

#Bring your own device (BYOD) policies

#Growing reliance on commercial software with known vulnerabilities

#Increasing sophistication of those who would do harm

New cards
3

Exploit

An attack on an info. system that takes advantage of a particular system vulnerability

New cards
4

Zero-day attack

Takes place before the security community or software developer becomes aware of and repairs a vulnerability

New cards
5

Black hat hacker

Someone who violates computer or Internet security maliciously or for illegal personal gain

New cards
6

Cracker

An individual who causes problems, steals data, and corrupts systems

New cards
7

Malicious insider

An employee or contractor who attempts to gain financially and/or disrupt a company's information systems and business operations

New cards
8

Industrial spy

An individual who captures trade secrets and attempts to gain an unfair competitive advantage

New cards
9

Cybercriminal

Someone who attacks a computer system or network for financial gain

New cards
10

Hacktivist

An individual whose goal is to promote a political ideology

New cards
11

Cyberterrorist

Someone who attempts to destroy government infrastructure, financial institutions, and other corps, utilities, and emergency response units

New cards
12

Ransomware

Malware that stops you from using your computer or accessing your data until you meet certain demands such as paying a ransom or sending photos to the attacker

New cards
13

Virus

a piece of programming code inserted into other programming to cause some unexpected and, for the victim, usually undesirable event

New cards
14

Worm

a harmful program that resides in the active memory of the computer and duplicates itself

New cards
15

Trojan horse

A program in which malicious code is hidden inside a seemingly harmless program.

New cards
16

Logic bomb

executes when it is triggered by a specific event.

New cards
17

Blended threat

An attack that combines the features of a virus, worm, Trojan horse, and other malicious code into a single payload

New cards
18

Spam

The use of email systems to send unsolicited email to large numbers of people

New cards
19

Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act

Makes spam legal with certain restrictions--the email must include: a real return address, a label specifying that it is an ad or solicitation, and a way for recipients to opt out of future emails

New cards
20

CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart)

Software that generates and grades tests that humans can pass but computer programs cannot

New cards
21

distributed denial-of-service (DDoS) attack

an attack that takes over computers via the Internet, causing them to flood a target site with demands for data and other small tasks

New cards
22

Rootkit

A set of programs that enables its user to gain administrator level access to a computer without the end user's consent or knowledge.

New cards
23

Advanced Persistent Threat (APT)

an attack in which an intruder gains access to a network and stays there--undetected--with the intention of stealing data over a period of weeks or months

New cards
24

Phishing

The act of fraudulently using email to try to get the recipient to reveal personal data.

New cards
25

Spear phishing

A variation of phishing in which the phisher sends fraudulent emails to a certain organization's employees.

New cards
26

Smishing

A variation of phishing in which victims receive a legitimate-looking SMS text message on their phone telling them to call a specific phone number or to log on to a Web site.

New cards
27

Vishing

A variation of phishing in which victims receive a voice mail telling them to call a specific phone number or log on to access a specific Web site.

New cards
28

Cyberespionage

The deployment of malware that secretly steals data in the computer systems of organizations, such as government agencies, military contractors, political organizations, and manufacturing firms.

New cards
29

Cyberterrorism

the intimidation of a government or a civilian population by using IT to disable critical national infrastructure

New cards
30

Department of Homeland Security (DHS)

a federal agency whose goal is to provide for a safe, more secure America, resilient against terrorism and other potential threats

New cards
31

U.S. Computer Emergency Readiness Team (US-CERT)

A DHS and public/private sector partnership; serves as a clearinghouse for information on new security threats

New cards
32

Computer Fraud and Abuse Act

Addresses fraud and related activities in association with computers including:

#Accessing a computer w/o authorization

#Transmitting code that causes harm to a computer

#Trafficking of computer passwords

#Threatening to cause damage to a protected computer

New cards
33

Stored Wire and Electronic Communications and Transactional Records Access Statutes

Focuses on unlawful access to stored communications to obtain, alter, or prevent authorized access to a wire or electronic communication while it is in electronic storage

New cards
34

USA Patriot Act

Defines cyberterrorism and associated penalties

New cards
35

CIA security triad

Confidentiality, Integrity, Availability of systems and data

New cards
36

Mission-critical processes

Business processes that are more pivotal to continued operations and goal attainment than others

New cards
37

Bank Secrecy Law of 1970

Requires financial institutions in the United States to assist U.S. government agencies in detecting and preventing money laundering

New cards
38

Federal Information Security Management Act

Requires every federal agency to provide information security for the date and information system that support the agency's operations and assets

New cards
39

Health Insurance Portability and Accountability Act

Regulates the use and disclosure of an individual's health information

New cards
40

Security dashboard software

#Provides a display of all key performance indicators including: threats, exposures, policy compliance, incident alert

New cards
41

Authentication methods

#Username and password

#Smart card and a PIN

#Fingerprint

#Voice pattern sample

#Retina scan

New cards
42

Multifactor authentication schemes

#Biometrics

#One-time passwords

#Hardware tokens that plug into a USB port and generate a password

New cards
43

Firewall

a system of software and/or hardware that stands guard between an org's internal network and the Internet

New cards
44

Next-generation firewall (NGFW)

a hardware- or software-based network security system that blocks attacks by filtering network traffic based on packet contents

New cards
45

Routers allow you to:

#Create a secure network by assigning it a passphrase

#Specify a unique media access control (MAC) address for each legitimate device connected to the network and prevent access by any other device

New cards
46

Encryption

the process of scrambling messages or data in such a way that only authorized parties can read it

New cards
47

Encryption key

a value that is applied to unencrypted text to produce encrypted text that is unreadable by those without the encryption key == two types of encryption algorithms: symmetric and asymmetric

New cards
48

Transport Layer Security (TLS)

#a communications protocol that ensures privacy between communicating applications and their users on the Internet

#TLS enables a client (e.g., a web browser) to initiate a temporary private conversation with a server

New cards
49

Intrusion detection system (IDS)

#Knowledge-based: contains info about specific attacks and system vulnerabilities and watches for attempts to exploit these vulnerabilites (e.g., repeated failed login attempts

#Behavior-based: models normal behavior of a system and its users based on reference info; compares current activity to this model, looking for deviations (e.g., unusual traffic at odd hours)

New cards
50

CIA at the Application Level

#Authentication methods

#User roles and accounts

#Data encryption

New cards
51

CIA at the End-User-Level

#Security education

#Authentication methods

#Antivirus software

#Data encryption

New cards
52

Response to Cyberattack

#An org should be prepared for the worst

#Primary goal must to be regain control and limit damage, not attempt to monitor or catch an intruder

#A well-developed response plan helps keep an incident under technical and emotional control

New cards
53

Eradication

Before the IT security group begins eradication efforts, it must collect and log all possible criminal evidence and then verify all backups are current, complete, and free of malware

New cards
54

Managed security service provider (MSSP)

A company that monitors, manages, and maintains computer and network security for other organizations.

New cards
55

Computer forensics

Combines all the elements of law and computer science to collect, examine, and preserve data from computer devices and networks in a manner that preserves the integrity of the data gathered so it is admissible as evidence in court

New cards
robot