Chapter 3 Cyberattacks and Cybersecurity

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/64

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

65 Terms

1
New cards

Bring your own device (BYOD)

Business policy that permits employees to use their own mobile devices to access company computing resources

2
New cards

Exploit

An attack on an information system that takes advantage of a particular system vulnerability

3
New cards

Zero-day attack

Takes place before the security community or software developer becomes aware of and repairs a vulnerability

4
New cards

Black hat hacker

Someone who violates computer or Internet security maliciously or for illegal personal gain

5
New cards

Cracker

An individual who causes problems, steals data, and corrupts systems

6
New cards

Malicious insider

An employee or contractor who attempts to gain financially and/or disrupt a company’s information systems

7
New cards

Industrial spy

An individual who captures trade secrets to gain an unfair competitive advantage

8
New cards

Cybercriminal

Someone who attacks a computer system for financial gain

9
New cards

Hacktivist

An individual whose goal is to promote a political ideology

10
New cards

Cyberterrorist

Someone who attempts to destroy government infrastructure, financial institutions, and other corporations, utilities, and emergency response units

11
New cards

Ransomware

Malware that stops you from using your computer or accessing your data until you meet certain demands, such as paying a ransom

12
New cards

Virus

A piece of programming code, disguised as something else, that causes a computer to behave in an unexpected and usually undesirable manner

13
New cards

Worm

A harmful program that resides in the active memory of the computer and duplicates itself

14
New cards

Trojan horse

A program in which malicious code is hidden inside a seemingly harmless program

15
New cards

Logic bomb

Executes when triggered by a specific event

16
New cards

Blended threat

An attack that combines the features of a virus, worm, Trojan horse, and other malicious code into a single payload

17
New cards

Spam

The use of email systems to send unsolicited email to large numbers of people

18
New cards

Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act

Makes spam legal with certain restrictions—the email must include: a real return address, a label specifying that it is an ad or solicitation, and a way for recipients to opt out of future emails

19
New cards

CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart)

Software that generates and grades tests that humans can pass but computer programs cannot

20
New cards

Distributed denial-of-service (DDoS) attack

An attack that takes over computers via the Internet, causing them to flood a target site with demands for data and other small tasks

21
New cards

Rootkit

A set of programs that enables its user to gain administrator-level access to a computer without the end user’s consent or knowledge

22
New cards

Advanced persistent threat (APT)

An attack in which an intruder gains access to a network and stays there— undetected—with the intention of stealing data over a period of weeks or months

23
New cards

Phishing

The act of fraudulently using email to try to get the recipient to reveal personal data

24
New cards

Spear phishing

A variation of phishing in which the phisher sends fraudulent emails to an organization’s employees

25
New cards

Smishing

A variation of phishing in which the victims receive a legitimate-looking text message telling them to call a specific phone number or log on to a website

26
New cards

Vishing

A variation of phishing in which the victims receive a voice-mail message telling them to call a phone number or access a website

27
New cards

Cyberespionage

The deployment of malware that steals data from government agencies, military contractors, political organizations, or manufacturing firms

28
New cards

Cyberterrorism

The intimidation of a government or a civilian population by using IT to disable critical national infrastructure

29
New cards

Department of Homeland Security (DHS)

A federal agency whose goal is to provide for a safer, more secure America, resilient against terrorism and other potential threats

30
New cards

U.S. Computer Emergency Readiness Team (US-CERT)

A DHS and public/private sector partnership; serves as a clearinghouse for information on new security threats

31
New cards

Computer Fraud and Abuse Act

• Addresses fraud and related activities in association with computers, including:

-Accessing a computer without authorization

-Transmitting code that causes harm to a computer

-Trafficking of computer passwords

-Threatening to cause damage to a protected computer

32
New cards

Fraud and Related Activity in Connection with Access Devices Statute

Covers false claims regarding unauthorized use of credit cards

33
New cards

Stored Wire and Electronic Communications and Transactional Records Access Statutes

• Focuses on unlawful access to stored communications to obtain, alter, or prevent authorized access to a wire or electronic communication while it is in electronic storage

34
New cards

USA Patriot Act

Defines cyberterrorism and associated penalties

35
New cards

CIA security triad

The confidentiality, integrity, and availability of systems and data

36
New cards

IT security practices focus on the CIA security triad:

• Confidentiality ensures only those individuals with proper authority can access sensitive data

• Integrity ensures data can only be changed by authorized users

• Availability ensures data can be accessed when and where needed

37
New cards

Risk assessment

The process of assessing security related risks to an organization’s computers and networks from both internal and external threats

38
New cards

Disaster recovery plan

A documented process for recovering an organization’s business information system assets—including hardware, software, data, networks, and facilities—in the event of a disaster

39
New cards

Mission-critical processes

Business processes that are more pivotal to continued operations and goal attainment than others

40
New cards

Security policy

A policy that defines an organization’s security requirements, as well as the controls and sanctions needed to meet those requirements

41
New cards

Security audit

An audit that evaluates whether an organization has a well-considered security policy in place and if it is being followed

42
New cards

Bank Secrecy Law of 1970

-Requires financial institutions in the United States to assist U.S. government agencies in detecting and preventing money laundering

43
New cards

Federal Information Security Management Act

-Requires every federal agency to provide information security for the data and information systems that support the agency’s operations and assets

44
New cards

Health Insurance Portability and Accountability Act

Regulates the use and disclosure of an individual’s health information

45
New cards

Security dashboard software

• Provides a comprehensive display of all key performance indicators related to an organization’s security defenses, including:

-Threats-Exposures-Policy compliance-Incident alert

46
New cards

Authentication methods

An organization must authenticate users attempting to access its network-Username and password-Smart card and a PIN-Fingerprint-Voice pattern sample-Retina scan

47
New cards

Multifactor authentication schemes include:

-Biometrics

-One-time passwords

-Hardware tokens that plug into a USB port and generate a password

48
New cards

Firewall

A system of software and/or hardware that stands guard between an organization’s internal network and the Internet

49
New cards

Next-generation firewall (NGFW)

A hardware- or software based network security system that blocks attacks by filtering network traffic based on packet contents

50
New cards

Router

A networking device that connects multiple networks and transmits data packets between networks

51
New cards

Encryption

The process of scrambling messages or data in such a way that only authorized parties can read it

52
New cards

Encryption key

A value that is applied to unencrypted text to produce encrypted text that is unreadable by those without the encryption key

53
New cards

Transport Layer Security (TLS)

A communications protocol that ensures privacy between communicating applications and their users on the Internet

54
New cards
55
New cards

Proxy server

Acts as an intermediary between a web browser and another server on the Internet

56
New cards

Virtual private network (VPN)

Enables remote users to securely access an organization’s computing resources and share data by transmitting and receiving encrypted data over public networks, such as the Internet

57
New cards

Intrusion detection system (IDS)

Software and/or hardware that monitors system resources and activities and issues an alert when it detects network traffic attempting to circumvent security measures

58
New cards

Security education

Educate end users about the importance of security so they are motivated to understand and follow security policies.

59
New cards

Authentication methods

Require end users to implement a security passcode that must be entered before their device accepts further input.

60
New cards

Virus Signature

A specific sequence of bytes that indicates the presence of a previously identified virus

61
New cards

Data encryption

Full-disk encryption protects storage devices and/or hard drives so they cannot be removed from a computer and plugged into another computing device

62
New cards

Eradication

Before the IT security group begins eradication efforts, it must collect and log all possible criminal evidence and then verify all backups are current, complete, and free of malware.

63
New cards

Incident Follow-Up

An essential part of follow-up is to determine how the organization’s security was compromised so that it does not happen again.

64
New cards

Managed security service provider (MSSP)

A company that monitors, manages, and maintains computer and network security for other organizations

65
New cards

Computer forensics

Combines elements of law and computer science to collect, examine, and preserve data from computer devices and networks in a manner that preserves the integrity of the data gathered so it is admissible as evidence in court