CIS 425 Guo

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 281

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

282 Terms

1

What are the critical assets

a) information

b) custom business software

c) system software

d) physical items

e) Services

a & b | Everything else is easily replaced

New cards
2

define threat

Events or actions that represent a danger to information assets.

By itself does not mean that security has been compromised; means that the potential for creating a loss is real

New cards
3

delay in information being transmitted is a what

threat

New cards
4

Threat Actor

A person or element that has the power to carry out a threat.

New cards
5

A force of nature can be classified as a:

Threat Actor. The result of a hurricane could destroy computer equipment and its information

New cards
6

Vulnerability

A flaw or weakness that allows a threat actor to bypass security.

New cards
7

If a threat actor can exploit a system through a hole (vulnerability)

Exploiting the vulnerability through an attack vector

New cards
8

attack vector

means by which an attack can occur

New cards
9

Attack Surface

The sum of all attack vectors. The smaller the attack surface, the more secure is the network.

New cards
10

Risk

situation that involves exposure to some type of danger

New cards
11

Four levels to deal with risk:

Accept

Transfer

Avoid

Mitigate

New cards
12

Accept

Risk acknowledged, no steps taken to address it

New cards
13

Transfer

Shift the risk to a third party

New cards
14

Avoid

The risk is acknowledged, but making the decision not to partake in the activity

New cards
15

Mitigate

An attempt to lower the severity of the risk

New cards
16

risk deterrence

The understanding of something about the "enemy," and letting "them" know the harm that can come their way if they cause harm to you

New cards
17

Sign in parking lot that says "Trespassers will be punished to the full extent of the law" is an example of what

Risk deterrence

New cards
18

Script Kiddies

find hacking code on the internet and click-and-point their way into systems to cause damage or spread viruses

No Skills

New cards
19

Hactivist

Strongly motivated by ideology or retaliatory

Not well organized/defined

can be motivated to attack governments

New cards
20

Nation State Actors

Well-resourced and highly trained attackers

target highly sensitive economic, proprietary or national security information

New cards
21

Advanced Persistent Threat

Use innovative tools and once system is infect it silently extracts data over an extended period

Most commonly associated with nation state actors

New cards
22

Insiders

Most serious threat. can be employees, contractors, and business partners.

New cards
23

Accounted for 58% of breaches in an enterprise

insiders

New cards
24

Cyberterrorism

the use of computer and networking technologies against persons or property to intimidate or coerce governments, individuals, or any segment of society to attain political, religious, or ideological goals

New cards
25

Organized Crime

Moving from traditional criminal activities to more rewarding and less risky online attacks

New cards
26

Layering (Defense in Depth)

Provides the most comprehensive protection by creating layers of protection

New cards
27

Limiting (least privilege)

Only allow access to a minimum. Allow users to see what they need and no more.

New cards
28

Diversity

Works hand in hand with layering. The idea of having different devices at different layers to ensure that is a layer is compromised, the whole system is not compromised.

Can be achieved by using different types of devices, different vendors, and even different groups that distribute access and those that protect the access.

New cards
29

Obscurity

Blinding the world to what is inside.

Not revealing the operating system, hardware brand, or software brand

New cards
30

Simplicity

Keep systems simple on the inside and complex from the outside

New cards
31

LLDOS

Layering

Limiting

Diversity

Obscurity

Simplicity

New cards
32

Malware

software that is intended to damage or disable computers and computer systems.

New cards
33

Five classifications of malware

Circulation

infection

concealment

payload capabilities

New cards
34

What two malware have the primary trait of circulation

viruses and worms

New cards
35

What two things does a virus need

A file to attach to

Human to transport it to other computers

New cards
36

If a virus is attached to an executable file it is called a

Program file

New cards
37

If a virus attaches to a data file it is called a

Macro virus

New cards
38

Appender Infection

Virus appends itself to end of a file and inserts a jump statement to trigger the virus code to execute

New cards
39

Armored Virus

A virus that goes to great lengths in order to avoid detection.

New cards
40

Swiss Cheese Virus

Virus is scrambled (encrypted)

Decryption engine divided and placed into different places

Tied together at execution

New cards
41

Split Injection

Split the virus into several bodies

Pieces placed randomly in the code

New cards
42

Mutation virus

able to change itself

New cards
43

Oligomorphic Virus

changes its internal code to one of a set number of predefined mutations whenever executed

New cards
44

Polymorphic Virus

completely changes from its original form when executed

New cards
45

Metamorphic Virus

can rewrite its own code and appear different each time it is executed

New cards
46

T/F A virus can spread to other computers without a human

False

New cards
47

T/F a virus must enter their host passively

True; A virus depends on the action of an outside agent

New cards
48

What is the primary purpose of both a virus and a worm

Their purpose is to spread

New cards
49

Another name for a worm is

Network Virus

New cards
50

T/F: A worm is designed to enter a computer through the network

True

New cards
51

What is the biggest difference between a virus and worm

A virus can only replicate on the host computer, while a work can self replicate between computers

New cards
52

Does a worm infect a file?

No

New cards
53

Does there need to be a user action to spread a worm?

No

New cards
54

How does a virus spread to other computers

User transfers infected files to other devices

New cards
55

How does a virus infect?

Inserts malicious code into a program or datafile

New cards
56

How does a worm infect

Exploits a vulnerability in an application or operating system

New cards
57

Trojan Horse

a program that appears desirable but actually contains something harmful

New cards
58

Remote Access Trojan (RAT)

A Trojan that also gives the threat agent unauthorized remote access to the victim's computer by using specially configured communication protocols.

New cards
59

Ransomware

a type of malicious software designed to block access to a computer system until a sum of money is paid.

New cards
60

Ransomware Pricing

Small enough so victim will pay

Large enough so attacker makes money

New cards
61

Goals of ransomware

Instill fear

Immediate solution

New cards
62

Crypto-malware

A type of ransomware that encrypts the user's data until a fine is paid.

New cards
63

What two enhancements to crypto-malware make it even more of a concern

Instead of encrypting files only on the user's local hard drive, it now encrypts all files on any network or attached device that is connected to that computer

Using Crypto-malware to infect mobile devices such as smartphones and tablets

New cards
64

What is the process for Crypto-malware

once infected malware connects with C&C

1) Locking key generated (encrypts all files on computer)

2) Locking key encrypted from a downloaded key from C&C Server

New cards
65

Downfall of Crypto-malware

If server address is known, it can be blocked and prevent communication with C&C

Solution Hardcode key into malware: --> Resulted in victims being able to send the decryption key to others infected

New cards
66

Rootkit

Can hide the presence of other malware (viruses) on the computer by accessing lower layers of the operating system or by using undocumented functions to make alterations.

New cards
67

What malware does this:

Hides malicious files and prevents scanning software from being able to detect it

Rootkit

New cards
68

What're the primary payload capabilities

Collect and delete data

Modify System Security

Launch Attacks

New cards
69

Spyware

A type of Malware that monitors and saves data from users without them knowing about it.

New cards
70

A keylogger belongs to what malware classification

Payload Capabilities + Collect data

New cards
71

Keylogger

a malicious program that records keystrokes.

New cards
72

T/F a keylogger can turn on a victims camera

True

New cards
73

T/F a keylogger can be installed remotely

True | Done from a virus or trojan

New cards
74

Adware

A software program that delivers advertising content in a manner that is unexpected and unwanted by the user.

New cards
75

Logic Bombs

A malware that is frequently used to delete data.

Added to a legit program but lies dormant until a psecific event triggers it.

New cards
76

backdoor

Software code that gives access to a program or a service that circumvents normal security protections.

Allows an attacker to leave and come back bypassing all security measures

New cards
77

Bot/Zombie

an infected computer that is remotely controlled by a hacker

New cards
78

Social Engineering

A means of gathering information for an attack by relying on the weaknesses of individuals.

New cards
79

Phishing

An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information

New cards
80

spear phishing

a phishing expedition in which the emails are carefully designed to target a particular person or organization

New cards
81

Whaling

A phishing attack that targets only wealthy individuals.

New cards
82

vishing

a phone scam that attempts to defraud people by asking them to call a bogus telephone number to confirm their account information

New cards
83

Hoax

is an email chain letter that warns of impending viruses and tries to scare users into forwarding and continuing the hoax email.

Change security settings

New cards
84

Tailgating

When an unauthorized individual enters a restricted-access building by following an authorized user.

New cards
85

Shoulder surfing

Gaining compromising information through observation (as in looking over someone's shoulder).

New cards
86

Cryptography

The practice of transforming information so that it is secure and cannot be accessed by unauthorized persons.

New cards
87

How does Cryptography accomplish security

Scrambling the information in such a way that only approved recipients can access it

New cards
88

Steganography

A field within cryptography; uses images metadata to hide data.

New cards
89

Encryption

Changing original text into a secret message using cryptography

New cards
90

Plaintext

Unencrypted data that is input for encryption or is the output of decryption

New cards
91

Cipher Text

Data that has been encrypted.

New cards
92

Cleartext

Data stored or transmitted without encryption

New cards
93

Cipher

the generic term for a technique (or algorithm) that performs encryption

New cards
94

Key

A mathematical value entered into a cryptographic algorithm to produce encrypted data.

New cards
95

ROT13

A substitution cipher that uses a key of 13. To encrypt a message, you would rotate each letter 13 spaces. To decrypt a message, you would rotate each letter 13 spaces.

New cards
96

XOR cipher

An encryption algorithm based on the binary operation eXclusive OR that compares two bits.

Involves a combinator

New cards
97

If two bits are the same / different using XOR cipher what would the output be for each

Match = 0

Different = 1

New cards
98

If the strength of a cryptographic algorithm depends on formulas what do formulas depend on ?

Quality of random numbers

New cards
99

T/F a past number can predict a future number in cryptography

False

New cards
100

T/F Computers can generate random numbers

False | They are not truly random

New cards

Explore top notes

note Note
studied byStudied by 344 people
752 days ago
5.0(2)
note Note
studied byStudied by 5 people
815 days ago
5.0(1)
note Note
studied byStudied by 138 people
970 days ago
5.0(1)
note Note
studied byStudied by 16 people
691 days ago
5.0(2)
note Note
studied byStudied by 35 people
861 days ago
5.0(1)
note Note
studied byStudied by 16 people
720 days ago
5.0(1)
note Note
studied byStudied by 31 people
521 days ago
5.0(1)
note Note
studied byStudied by 15 people
741 days ago
5.0(2)

Explore top flashcards

flashcards Flashcard (33)
studied byStudied by 9 people
757 days ago
5.0(1)
flashcards Flashcard (20)
studied byStudied by 4 people
543 days ago
5.0(3)
flashcards Flashcard (22)
studied byStudied by 57 people
708 days ago
4.5(2)
flashcards Flashcard (50)
studied byStudied by 5 people
554 days ago
5.0(1)
flashcards Flashcard (42)
studied byStudied by 12 people
485 days ago
5.0(1)
flashcards Flashcard (33)
studied byStudied by 1 person
694 days ago
5.0(1)
flashcards Flashcard (31)
studied byStudied by 23 people
780 days ago
5.0(1)
flashcards Flashcard (54)
studied byStudied by 18568 people
709 days ago
4.5(362)
robot