IS - Chapter 8

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/38

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 4:19 PM on 4/17/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

39 Terms

1
New cards
What are the three main reasons systems are vulnerable?
They are connected, complex, and rely on fallible humans
2
New cards
What is a threat actor?
Individual or group that seeks to exploit system vulnerabilities
3
New cards
What are common types of threat actors?
Cybercriminals; nation-states; terrorists; hackers; hacktivists; insiders/employees
4
New cards
What is malware?
Malicious software designed to harm systems or steal data
5
New cards
What is a virus?
Malware that attaches to programs and requires user action to spread
6
New cards
What is a worm?
Malware that spreads independently across networks without user action
7
New cards
What is a Trojan horse?
Malware disguised as legitimate software with hidden harmful functions
8
New cards
What is ransomware?
Malware that encrypts files and demands payment to restore access
9
New cards
What is spyware?
Software that monitors user activity without consent
10
New cards
What is a keylogger?
Type of spyware that records keystrokes to steal sensitive information
11
New cards
What is a botnet?
Network of infected computers used for coordinated attacks like DDoS
12
New cards
What is credential stuffing?
Using stolen login credentials to gain unauthorized account access
13
New cards
What is identity theft?
Stealing personal information to impersonate someone
14
New cards
What is spoofing?
Disguising identity to trick users (e.g., fake email address)
15
New cards
What is phishing?
Fake emails or websites used to steal sensitive information
16
New cards
What is pharming?
Redirecting users to fake websites even when they enter correct URLs
17
New cards
What is an evil twin attack?
Fake Wi-Fi network used to steal data
18
New cards
What is social engineering?
Manipulating people into revealing confidential information
19
New cards
What is a DoS attack?
Flooding a server with requests to crash it
20
New cards
What is a DDoS attack?
DoS attack using many compromised computers (botnet)
21
New cards
What is a LOTL attack?
Using legitimate system tools to perform attacks
22
New cards
What is a zero-day vulnerability?
Security flaw unknown to developers with no fix available
23
New cards
What are general controls?
Controls that govern overall IT infrastructure and security
24
New cards
What are application controls?
Controls specific to applications to ensure accurate processing
25
New cards
What is an acceptable use policy (AUP)?
Rules defining proper use of company systems
26
New cards
What is risk assessment?
Evaluating likelihood of threats and potential losses
27
New cards
What is disaster recovery planning?
Process of restoring IT systems after disruption
28
New cards
What is business continuity planning?
Process of maintaining business operations after disruption
29
New cards
What is an information systems audit?
Evaluation of an organization’s security and controls
30
New cards
What is an intrusion detection system (IDS)?
System that monitors and alerts about suspicious activity
31
New cards
What is an intrusion prevention system (IPS)?
System that detects and actively blocks threats
32
New cards
What is a firewall?
System that controls incoming and outgoing network traffic
33
New cards
What is unified threat management (UTM)?
System that combines multiple security tools into one
34
New cards
What is authentication?
Process of verifying a user’s identity
35
New cards
What is biometric authentication?
Authentication using physical traits like fingerprints or face recognition
36
New cards
What is zero trust?
Security model where no user or system is trusted by default
37
New cards
What is encryption?
Process of converting data into unreadable form to protect it
38
New cards
What is symmetric encryption?
Encryption using one shared key
39
New cards
What is public key encryption?
Encryption using a public key and a private key