CIS 440 issues in computer security chapter 1-5

5.0(1)
studied byStudied by 19 people
5.0(1)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/448

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

449 Terms

1
New cards

Information Security / InfoSec

The practice of protecting information from unauthorized access, disclosure, disruption, destruction, or modification.

2
New cards

Confidentiality

Ensures information is only disclosed to authorized users. Example A customer's credit card number used in an online transaction should not be disclosed to other customers.

3
New cards

Integrity

Ensures information is only modified in an authorized manner. Example A bank customer should not be able to increase the customer's account balance without adding funds to the account.

4
New cards

Availability

Ensures information is accessible by authorized users whenever required. Example Smishing, Phishing aimed at high-value individuals like executives.

5
New cards

Business Email Compromise (BEC)

Impersonating a trusted individual to trick employees into financial transactions.

6
New cards

Misinformation

False information spread without intent to harm.

7
New cards

Disinformation

False information spread intentionally to mislead.

8
New cards

Malware

Any software developed to compromise the confidentiality, integrity, or availability of data.

9
New cards

Virus

A type of malware that self-replicates and spreads within infected devices.

10
New cards

Fileless Virus

A virus that exists only in memory and is undetectable by traditional scanning.

11
New cards

Worm

A self-replicating malware that spreads across networks.

12
New cards

Bot

A device infected with malware that allows remote control by an attacker.

13
New cards

Cryptomalware

Malware that uses computing resources to mine cryptocurrency.

14
New cards

Ransomware

Malware that denies access to files until a ransom is paid.

15
New cards

Spyware

Malware that collects user data without consent.

16
New cards

Bloatware

Unwanted software preloaded on a new device by the manufacturer.

17
New cards

Keylogger

Malware that records keystrokes.

18
New cards

Trojan

Malware disguised as legitimate software.

19
New cards

Remote Access Trojan (RAT)

Trojans that provide remote access to infected devices.

20
New cards

Potentially Unwanted Program (PUP)

Software considered unnecessary or unwanted.

21
New cards

Backdoor

Malware that enables unauthorized access to a device.

22
New cards

Logic Bomb

Malware that triggers under specified conditions.

23
New cards

Rootkit

Malware that allows administrative access without detection.

24
New cards

Security Control

Mechanisms that protect confidentiality, integrity, and availability of systems and data.

25
New cards

**Technical Control

Controls performed by systems.

26
New cards

Managerial Control

Controls addressing risk management and governance.

27
New cards

Operational Control

Controls performed by employees.

28
New cards

Physical Control

Controls securing the physical environment.

29
New cards

Preventive Control

Controls that prevent security issues.

30
New cards

Deterrent Control

Controls that discourage policy violations.

31
New cards

Directive Control

Controls that provide direction.

32
New cards

Detective Control

Controls that identify security issues.

33
New cards

Corrective Control

Controls that restore normal operations after issues occur.

34
New cards

Identity and Access Management (IAM) / Identity Management (IdM)

A framework for managing user identities and controlling access to resources.

35
New cards

User

An entity accessing a system, typically a person or device.

36
New cards

Identification

The act of claiming an identity.

37
New cards

Username

A unique identifier assigned to a user.

38
New cards

Certificate

A digital credential binding a user's identity to a cryptographic key.

39
New cards

Token

A physical device generating a unique code for authentication.

40
New cards

SSH Key

A user's cryptographic key-pair.

41
New cards

Smart Card

A card with an embedded microchip for authentication.

42
New cards

Identity Proofing

Verifying a user's identity during account creation.

43
New cards

Attribute

A characteristic of an identity.

44
New cards

Authentication

Verifying a user's claim to an identity.

45
New cards

Authentication Factors

Types of evidence to prove identity claims.

46
New cards

Authentication Protocol

A protocol designed for securely transferring authentication information.

47
New cards

Authorization

Granting a user access to resources.

48
New cards

Subject

An entity attempting to access a resource.

49
New cards

Object

A resource the subject wants to access.

50
New cards

Access Control Model / Authorization Model

Rules for managing access control.

51
New cards

Authentication Factor

Evidence provided to prove a user's claim to identity.

52
New cards

Knowledge Factor

Information known by the user.

53
New cards

Possession Factor

Something the user possesses.

54
New cards

Inherence Factor

A unique characteristic of the user.

55
New cards

Location Factor

Information about the user's current location.

56
New cards

Behavior Factor

An action performed by the user.

57
New cards

Single-Factor Authentication (SFA)

Uses one authentication factor.

58
New cards

Two-Factor Authentication / 2FA

Uses two different authentication factors.

59
New cards

Smart Card Authentication

Using a smart card for authentication.

60
New cards

Multi-Factor Authentication (MFA)

Uses two or more authentication factors.

61
New cards

Knowledge-Based Authentication (KBA)

Requires knowledge of personal information for validation.

62
New cards

Static KBA / Shared Secrets

Based on predefined questions between the user and the system.

63
New cards

Dynamic KBA

Knowledge questions based on the user's private data.

64
New cards

One-Time Password (OTP)

An authentication code used once.

65
New cards

Time-Based One-Time Password (TOTP)

An OTP that changes periodically.

66
New cards

HMAC-Based One-Time Password (HOTP)

An OTP that changes based on an event.

67
New cards

Authentication Application / Software Token

An application generating OTPs.

68
New cards

Push Notification

A notification sent to a user's device for authentication.

69
New cards

Security Token

A hardware device generating an OTP.

70
New cards

Static Code

A pre-generated OTP.

71
New cards

Trusted Platform Module (TPM)

A secure processor for cryptographic operations.

72
New cards

Full Disk Encryption (FDE)

Encryption of an entire drive.

73
New cards

Hardware Security Module (HSM)

A device providing cryptographic services.

74
New cards

Cryptoprocessor

A microprocessor for cryptographic operations.

75
New cards

FIPS-140

U.S. government security standard for cryptographic modules.

76
New cards

Secure Enclave

A tamper-resistant hardware component for secure operations.

77
New cards

Biometrics

Measurements of unique characteristics of an individual.

78
New cards

Physical Biometrics

Measurements of physical characteristics (e.g., fingerprints, facial patterns).

79
New cards

Behavioral Biometrics

Measurements of behavioral traits (e.g., voice, gait).

80
New cards

Biometric Authentication

Using biometrics to verify identity.

81
New cards

Biometric Factor / Inherence Factor

Unique physical or behavioral characteristics.

82
New cards

False Rejection Rate (FRR)

Percentage of valid biometric measures rejected.

83
New cards

False Acceptance Rate (FAR)

Percentage of invalid measures accepted.

84
New cards

Crossover Error Rate (CER)

Rate at which FRR and FAR are equal.

85
New cards

Efficacy Rate

Measure of a biometric system's effectiveness.

86
New cards

Relative Operating Characteristic (ROC)

Visual trade-off between FRR and FAR.

87
New cards

Password Authentication Protocol (PAP)

Authenticates a client to a server in point-to-point connections.

88
New cards

Challenge Handshake Authentication Protocol (CHAP)

Uses a shared secret to authenticate a client to a server.

89
New cards

Kerberos

An authentication protocol using a ticket-based mechanism.

90
New cards

Kerberos Realm

A network using Kerberos authentication.

91
New cards

Key Distribution Center (KDC)

Trusted third-party that authenticates users.

92
New cards

Authentication Server (AS)

Authenticates users.

93
New cards

Ticket-Granting Server (TGS)

Issues tickets for service access.

94
New cards

Ticket-Granting Ticket (TGT)

Allows requests for service tickets.

95
New cards

Service Ticket (ST)

Proof of a user's authorization to access a service.

96
New cards

Extensible Authentication Protocol (EAP)

An authentication framework for various protocols.

97
New cards

EAP Request

A request message from a server to a client.

98
New cards

EAP Response

A response message from a client to a server.

99
New cards

EAP Success

Message indicating successful authentication.

100
New cards

EAP Failure

Message indicating unsuccessful authentication.