Chapter 3 - Cyberattacks and Cybersecurity

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/82

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

83 Terms

1
New cards

Business Continuity Plan

A risk-based strategy that includes an occupant emergency evacuation plan, a continuity of operations plan, and an incident management plan with an active governance process to minimize the potential impact of any security incident and to ensure business continuity in the event of a cyberattack or some form of disaster.

2
New cards

Data encryption

Protects data being used within an application from unauthorized access

3
New cards

Zero-Day Attack

A cyberattack that takes place before the security community and/or software developers become aware of and fix a security vulnerability.

4
New cards

Bring Your Own Device (BYOD)

A business policy that permits, and in some cases, encourages employees to use their own mobile devices (smartphones, tablets, or laptops) to access company computing resources and applications, including email, corporate databases, the corporate intranet, and the Internet.

5
New cards

Exploit

An attack on an information system that takes advantage of a particular system vulnerability.

6
New cards

Ransomware

Malware that stops you from using your computer or accessing your data until you meet certain demands, such as paying a ransom or sending photos to the attacker.

7
New cards

Virus

A piece of programming code, usually disguised as something else, that causes a computer to behave in an unexpected and usually undesirable manner.

8
New cards

Worm

A harmful program that resides in the active memory of the computer and duplicates itself.

9
New cards

Trojan Horse

A seemingly harmless program in which malicious code is hidden.

10
New cards

Logic Bomb

A type of Trojan horse malware that executes when it is triggered by a specific event or at a predetermined time.

11
New cards

Blended Threat

A sophisticated threat that combines the features of a virus, worm, Trojan Horse, and other malicious code into a single payload.

12
New cards

Spam

The use of email systems to send unsolicited email to large numbers of people.

13
New cards

Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act

A law that specifies that it is legal to spam, provided the messages meet a few basic requirements - spammers cannot disguise their identity by using a false return address, the email must include a label specifying that it is an ad or a solicitation, and the email must include a way for recipients to indicate that they do not want future mass mailings.

14
New cards

Completely Automated Public Turing Test to Tell Computers and Humans Apart (CAPTCHA)

Software that generates and grades tests that humans can pass and all but the most sophisticated computer programs cannot.

15
New cards

Distributed Denial-of-Service Attack (DDoS)

An attack in which a malicious hacker takes over computers via the Internet and causes them to flood a target site with demands for data and other small tasks.

16
New cards

Botnet

A large group of computers, which are controlled from one or more remote locations by hackers, without the knowledge or consent of their owners.

17
New cards

Zombie

A computer that is part of a botnet and that is controlled by a hacker without the knowledge or consent of the owner.

18
New cards

Rootkit

A set of programs that enables its user to gain administrator-level access to a computer without the end-user's consent or knowledge.

19
New cards

Advanced Persistent Threat (APT)

A network attack in which an intruder gains access to a network and stays there-undetected-with the intention of stealing data over a long period of time (weeks or even months).

20
New cards

Phishing

The act of fraudulently using email to try to get the recipient to reveal personal data.

21
New cards

Spear Phishing

A variation of phishing in which the phisher sends fraudulent emails to a certain organization's employees.

22
New cards

Smishing

Another variation of phishing that involves the user of texting.

23
New cards

Vishing

Similar to smishing except that the victims receive a voicemail message telling them to call a phone number or access a website.

24
New cards

Cyberespionage

The deployment of malware that secretly steals data in computer systems of organizations, such as government agencies, military contractors, political organizations, and manufacturing firms.

25
New cards

Cyberterrorism

The intimidation of government or civilian population by using information technology to disable critical national infrastructure (e.g., energy, transportation, financial, law enforcement, and emergency response) to achieve political, religious, or ideological goals.

26
New cards

CIA Security Triad

Refers to confidentiality, integrity, and availability of systems data.

27
New cards

Confidentiality

ensures only those individuals with proper authority can access sensitive data.

28
New cards

Integrity

ensures data can only be changed by authorized users.

29
New cards

Availability

ensures data can be accessed when and where needed.

30
New cards

Risk Assessment

The process of assessing security-related risks to an organization's computers and networks from both internal and external threats.

31
New cards

Reasonable Assurance

A concept in computer security that recognizes that managers must use their judgement to ensure that the cost of control does not exceed the system's benefits or the risks involved.

32
New cards

Disaster Recovery Plan

A documented process for recovering an organization's business information systems assets-including hardware, software, data, networks, and facilities-in the event of a disaster.

33
New cards

Mission-Critical Process

Business processes that are more pivotal to continued operations and goal attainment than others.

34
New cards

Security Policy

A policy that defines an organization's security requirements, as well as the controls and sanctions needed to meet those requirements.

35
New cards

Security Audit

An audit that evaluates whether an organization has a well-considered security policy in place and if it is being followed.

36
New cards

Firewall

A system of software and/or hardware that stands guard between an organization's internal network and the Internet.

37
New cards

Security dashboard software

Provides a comprehensive display of all key performance indicators related to an organization's security defenses, including threats, exposures, policy compliance, and incident alerts.

38
New cards

Authentication methods

An organization must authenticate users attempting to access its network.

39
New cards

Next-Generation Firewall (NGFW)

A hardware-or software-based network security system that is able to detect and block sophisticated attacks by filtering network traffic dependent on the packet contents.

40
New cards

Router

A networking device that connects multiple networks and transmits data packets between networks

41
New cards

Encryption

The process of scrambling messages or data in such a way that only authorized parties can read it.

42
New cards

Encryption Key

A value that is applied (using an algorithm) to a set of unencrypted text (plaintext) to produce encrypted text that appears as a series of seemingly random characters (ciphertext) that is unreadable to those without the encryption key needed to decipher.

43
New cards

Two types of encryption algorithms

Symmetric and asymmetric

44
New cards

Transport Layer Security (TLS)

A communications protocol or system of rules that ensures privacy between communicating applications and their users on the Internet.

45
New cards

Proxy server

Acts as an intermediary between a web browser and another server on the Internet

46
New cards

Virtual private network (VPN)

Enables remote users to securely access an organization's computing resources and share data by transmitting and receiving encrypted data over public networks, such as the Internet

47
New cards

Intrusion Detection System (IDS)

Software and/or hardware that monitors system and network resources and activities and notifies network security personnel when it detects network traffic that attempts to circumvent the security measures of a networked computer environment.

48
New cards

Knowledge-based IDS

Contains information about specific attacks and system vulnerabilities and watches for attempts to exploit these vulnerabilities (e.g., repeated failed login attempts).

49
New cards

Behavior-based IDS

Models normal behavior of a system and its users based on reference information; compares current activity to this model, looking for deviations (e.g., unusual traffic at odd hours).

50
New cards

User roles and accounts

Used to give users authority to perform their responsibilities within an application and nothing more.

51
New cards

Security education

Educate end users about the importance of security so they are motivated to understand and follow security policies.

52
New cards

Authentication methods

Require end users to implement a security passcode that must be entered before their device accepts further input.

53
New cards

Antivirus Software

Software that scans for a specific sequence of bytes, known as a virus signature, that indicates the presence of a specific virus.

54
New cards

Virus Signature

A specific sequence of bytes that indicates to antivirus software that a specific virus is present.

55
New cards

Data encryption

Full-disk encryption protects storage devices and/or hard drives so they cannot be removed from a computer and plugged into another computing device

56
New cards

Incident notification

A key element of any response plan is to define who to notify and who not to notify in the event of a computer security incident.

57
New cards

Eradication

Before the IT security group begins eradication efforts, it must collect and log all possible criminal evidence and then verify all backups are current, complete, and free of malware.

58
New cards

Incident follow-up

An essential part of follow-up is to determine how the organization's security was compromised so that it does not happen again.

59
New cards

Managed Security Service Provider (MSSP)

A company that monitors, manages, and maintains computer and network security for other organizations.

60
New cards

Computer Forensics

A discipline that combines elements of law and computer science to identify, collect, examine, and preserve data from computer systems, networks, and storage devices in a manner that preserves the integrity of the data gathered so that it is admissible as evidence in a court of law.

61
New cards

Department of Homeland Security (DHS)

A large federal agency with more than 240,000 employees and a budget of almost $65 billion whose goal is to provide for a "safer, more secure America, which is resilient against terrorism and other potential threats."

62
New cards

U.S. Computer Emergency Readiness Team (US-CERT)

Established in 2003 to protect the nation's Internet infrastructure against cyberattacks, it serves as a clearinghouse for information on new viruses, worms, and other computer security topics.

63
New cards

Black Hat Hacker

Someone who violates computer or Internet security maliciously or for illegal personal gain.

64
New cards

Cracker

An individual who causes problems, steals data, and corrupts systems

65
New cards

Malicious Insider

An employee or contractor who attempts to gain financially and/or disrupt a company's information systems and business operations.

66
New cards

Industrial Spy

An individual who captures trade secrets and attempts to gain an unfair competitive advantage

67
New cards

Cybercriminal

Someone who attacks a computer system or network for financial gain

68
New cards

Hacktivist

An individual who hacks computers or websites in an attempt to promote a political ideology

69
New cards

Cyberterrorist

Someone who attempts to destroy the infrastructure components of governments, financial institutions, and other corporations, utilities, and emergency response units

70
New cards

Computer Fraud and Abuse Act (U.S. Code Title 18, Section 1030)

Addresses fraud and related activities in association with computers.

71
New cards

Fraud and Related Activity in Connection with Access Devices Statute (U.S. Code Title 18, Section 1029)

Covers false claims regarding unauthorized use of credit cards

72
New cards

Stored Wire and Electronic Communications and Transactional Records Access Statutes (U.S. Code Title 18, Chapter 121)

Focuses on unlawful access to stored communications to obtain, alter, or prevent authorized access to a wire or electronic communication while it is in electronic storage

73
New cards

USA Patriot Act (Public Law 107-56)

Defines cyberterrorism and associated penalties

74
New cards

about 58%

The number of global companies that have an overall security strategy is ___________?

75
New cards

Entering a user name and a strong end-user password at least 10 characters long including capital letters, numbers, and special characters.

Which of the following is not a multifactor authentication method?

76
New cards

Macro Viruses

What type of viruses have become a common and easily created form of malware that are created using applications such as Visual Basic or VB Script?

77
New cards

Bot Attack

Spammers can defeat the registration process of free email services by launching a coordinated attack that can sign up for thousands of untraceable email accounts. What is this type of attack known as?

78
New cards

Collect and log all possible criminal evidence from the system

Before the IT security group can begin an eradication effort, it must __________

79
New cards

Patch

Often a successful attack on an information system is due to poor system design or implementation. Once such a vulnerability is discovered, software developers quickly create and issue which of the following, in order to eliminate the problem?

80
New cards

USA Patriot Act

Which of the following is a federal law that provides a definition of the term cyberterrorism and under which young people primarily involved in what they consider to be minor computer pranks have been tried as cyberterrorist?

81
New cards

Dropper Code

Which of the following gets a rootkit installation started and can be easily activated by clicking on a link to a malicious Web site in an email or opening an infected PDF file?

82
New cards

Valid test results

The fundamental problem with trying to detect a rootkit is that the operating system cannot be trusted to provide which of the following?

83
New cards

Distributed Denial-of-Service Attack (DDoS)

What type of attack keeps the target so busy responding to a stream of automated requests that legitimate users cannot get in?