Chapter 3 - Cyberattacks and Cybersecurity

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 82

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

83 Terms

1

Business Continuity Plan

A risk-based strategy that includes an occupant emergency evacuation plan, a continuity of operations plan, and an incident management plan with an active governance process to minimize the potential impact of any security incident and to ensure business continuity in the event of a cyberattack or some form of disaster.

New cards
2

Data encryption

Protects data being used within an application from unauthorized access

New cards
3

Zero-Day Attack

A cyberattack that takes place before the security community and/or software developers become aware of and fix a security vulnerability.

New cards
4

Bring Your Own Device (BYOD)

A business policy that permits, and in some cases, encourages employees to use their own mobile devices (smartphones, tablets, or laptops) to access company computing resources and applications, including email, corporate databases, the corporate intranet, and the Internet.

New cards
5

Exploit

An attack on an information system that takes advantage of a particular system vulnerability.

New cards
6

Ransomware

Malware that stops you from using your computer or accessing your data until you meet certain demands, such as paying a ransom or sending photos to the attacker.

New cards
7

Virus

A piece of programming code, usually disguised as something else, that causes a computer to behave in an unexpected and usually undesirable manner.

New cards
8

Worm

A harmful program that resides in the active memory of the computer and duplicates itself.

New cards
9

Trojan Horse

A seemingly harmless program in which malicious code is hidden.

New cards
10

Logic Bomb

A type of Trojan horse malware that executes when it is triggered by a specific event or at a predetermined time.

New cards
11

Blended Threat

A sophisticated threat that combines the features of a virus, worm, Trojan Horse, and other malicious code into a single payload.

New cards
12

Spam

The use of email systems to send unsolicited email to large numbers of people.

New cards
13

Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act

A law that specifies that it is legal to spam, provided the messages meet a few basic requirements - spammers cannot disguise their identity by using a false return address, the email must include a label specifying that it is an ad or a solicitation, and the email must include a way for recipients to indicate that they do not want future mass mailings.

New cards
14

Completely Automated Public Turing Test to Tell Computers and Humans Apart (CAPTCHA)

Software that generates and grades tests that humans can pass and all but the most sophisticated computer programs cannot.

New cards
15

Distributed Denial-of-Service Attack (DDoS)

An attack in which a malicious hacker takes over computers via the Internet and causes them to flood a target site with demands for data and other small tasks.

New cards
16

Botnet

A large group of computers, which are controlled from one or more remote locations by hackers, without the knowledge or consent of their owners.

New cards
17

Zombie

A computer that is part of a botnet and that is controlled by a hacker without the knowledge or consent of the owner.

New cards
18

Rootkit

A set of programs that enables its user to gain administrator-level access to a computer without the end-user's consent or knowledge.

New cards
19

Advanced Persistent Threat (APT)

A network attack in which an intruder gains access to a network and stays there-undetected-with the intention of stealing data over a long period of time (weeks or even months).

New cards
20

Phishing

The act of fraudulently using email to try to get the recipient to reveal personal data.

New cards
21

Spear Phishing

A variation of phishing in which the phisher sends fraudulent emails to a certain organization's employees.

New cards
22

Smishing

Another variation of phishing that involves the user of texting.

New cards
23

Vishing

Similar to smishing except that the victims receive a voicemail message telling them to call a phone number or access a website.

New cards
24

Cyberespionage

The deployment of malware that secretly steals data in computer systems of organizations, such as government agencies, military contractors, political organizations, and manufacturing firms.

New cards
25

Cyberterrorism

The intimidation of government or civilian population by using information technology to disable critical national infrastructure (e.g., energy, transportation, financial, law enforcement, and emergency response) to achieve political, religious, or ideological goals.

New cards
26

CIA Security Triad

Refers to confidentiality, integrity, and availability of systems data.

New cards
27

Confidentiality

ensures only those individuals with proper authority can access sensitive data.

New cards
28

Integrity

ensures data can only be changed by authorized users.

New cards
29

Availability

ensures data can be accessed when and where needed.

New cards
30

Risk Assessment

The process of assessing security-related risks to an organization's computers and networks from both internal and external threats.

New cards
31

Reasonable Assurance

A concept in computer security that recognizes that managers must use their judgement to ensure that the cost of control does not exceed the system's benefits or the risks involved.

New cards
32

Disaster Recovery Plan

A documented process for recovering an organization's business information systems assets-including hardware, software, data, networks, and facilities-in the event of a disaster.

New cards
33

Mission-Critical Process

Business processes that are more pivotal to continued operations and goal attainment than others.

New cards
34

Security Policy

A policy that defines an organization's security requirements, as well as the controls and sanctions needed to meet those requirements.

New cards
35

Security Audit

An audit that evaluates whether an organization has a well-considered security policy in place and if it is being followed.

New cards
36

Firewall

A system of software and/or hardware that stands guard between an organization's internal network and the Internet.

New cards
37

Security dashboard software

Provides a comprehensive display of all key performance indicators related to an organization's security defenses, including threats, exposures, policy compliance, and incident alerts.

New cards
38

Authentication methods

An organization must authenticate users attempting to access its network.

New cards
39

Next-Generation Firewall (NGFW)

A hardware-or software-based network security system that is able to detect and block sophisticated attacks by filtering network traffic dependent on the packet contents.

New cards
40

Router

A networking device that connects multiple networks and transmits data packets between networks

New cards
41

Encryption

The process of scrambling messages or data in such a way that only authorized parties can read it.

New cards
42

Encryption Key

A value that is applied (using an algorithm) to a set of unencrypted text (plaintext) to produce encrypted text that appears as a series of seemingly random characters (ciphertext) that is unreadable to those without the encryption key needed to decipher.

New cards
43

Two types of encryption algorithms

Symmetric and asymmetric

New cards
44

Transport Layer Security (TLS)

A communications protocol or system of rules that ensures privacy between communicating applications and their users on the Internet.

New cards
45

Proxy server

Acts as an intermediary between a web browser and another server on the Internet

New cards
46

Virtual private network (VPN)

Enables remote users to securely access an organization's computing resources and share data by transmitting and receiving encrypted data over public networks, such as the Internet

New cards
47

Intrusion Detection System (IDS)

Software and/or hardware that monitors system and network resources and activities and notifies network security personnel when it detects network traffic that attempts to circumvent the security measures of a networked computer environment.

New cards
48

Knowledge-based IDS

Contains information about specific attacks and system vulnerabilities and watches for attempts to exploit these vulnerabilities (e.g., repeated failed login attempts).

New cards
49

Behavior-based IDS

Models normal behavior of a system and its users based on reference information; compares current activity to this model, looking for deviations (e.g., unusual traffic at odd hours).

New cards
50

User roles and accounts

Used to give users authority to perform their responsibilities within an application and nothing more.

New cards
51

Security education

Educate end users about the importance of security so they are motivated to understand and follow security policies.

New cards
52

Authentication methods

Require end users to implement a security passcode that must be entered before their device accepts further input.

New cards
53

Antivirus Software

Software that scans for a specific sequence of bytes, known as a virus signature, that indicates the presence of a specific virus.

New cards
54

Virus Signature

A specific sequence of bytes that indicates to antivirus software that a specific virus is present.

New cards
55

Data encryption

Full-disk encryption protects storage devices and/or hard drives so they cannot be removed from a computer and plugged into another computing device

New cards
56

Incident notification

A key element of any response plan is to define who to notify and who not to notify in the event of a computer security incident.

New cards
57

Eradication

Before the IT security group begins eradication efforts, it must collect and log all possible criminal evidence and then verify all backups are current, complete, and free of malware.

New cards
58

Incident follow-up

An essential part of follow-up is to determine how the organization's security was compromised so that it does not happen again.

New cards
59

Managed Security Service Provider (MSSP)

A company that monitors, manages, and maintains computer and network security for other organizations.

New cards
60

Computer Forensics

A discipline that combines elements of law and computer science to identify, collect, examine, and preserve data from computer systems, networks, and storage devices in a manner that preserves the integrity of the data gathered so that it is admissible as evidence in a court of law.

New cards
61

Department of Homeland Security (DHS)

A large federal agency with more than 240,000 employees and a budget of almost $65 billion whose goal is to provide for a "safer, more secure America, which is resilient against terrorism and other potential threats."

New cards
62

U.S. Computer Emergency Readiness Team (US-CERT)

Established in 2003 to protect the nation's Internet infrastructure against cyberattacks, it serves as a clearinghouse for information on new viruses, worms, and other computer security topics.

New cards
63

Black Hat Hacker

Someone who violates computer or Internet security maliciously or for illegal personal gain.

New cards
64

Cracker

An individual who causes problems, steals data, and corrupts systems

New cards
65

Malicious Insider

An employee or contractor who attempts to gain financially and/or disrupt a company's information systems and business operations.

New cards
66

Industrial Spy

An individual who captures trade secrets and attempts to gain an unfair competitive advantage

New cards
67

Cybercriminal

Someone who attacks a computer system or network for financial gain

New cards
68

Hacktivist

An individual who hacks computers or websites in an attempt to promote a political ideology

New cards
69

Cyberterrorist

Someone who attempts to destroy the infrastructure components of governments, financial institutions, and other corporations, utilities, and emergency response units

New cards
70

Computer Fraud and Abuse Act (U.S. Code Title 18, Section 1030)

Addresses fraud and related activities in association with computers.

New cards
71

Fraud and Related Activity in Connection with Access Devices Statute (U.S. Code Title 18, Section 1029)

Covers false claims regarding unauthorized use of credit cards

New cards
72

Stored Wire and Electronic Communications and Transactional Records Access Statutes (U.S. Code Title 18, Chapter 121)

Focuses on unlawful access to stored communications to obtain, alter, or prevent authorized access to a wire or electronic communication while it is in electronic storage

New cards
73

USA Patriot Act (Public Law 107-56)

Defines cyberterrorism and associated penalties

New cards
74

about 58%

The number of global companies that have an overall security strategy is ___________?

New cards
75

Entering a user name and a strong end-user password at least 10 characters long including capital letters, numbers, and special characters.

Which of the following is not a multifactor authentication method?

New cards
76

Macro Viruses

What type of viruses have become a common and easily created form of malware that are created using applications such as Visual Basic or VB Script?

New cards
77

Bot Attack

Spammers can defeat the registration process of free email services by launching a coordinated attack that can sign up for thousands of untraceable email accounts. What is this type of attack known as?

New cards
78

Collect and log all possible criminal evidence from the system

Before the IT security group can begin an eradication effort, it must __________

New cards
79

Patch

Often a successful attack on an information system is due to poor system design or implementation. Once such a vulnerability is discovered, software developers quickly create and issue which of the following, in order to eliminate the problem?

New cards
80

USA Patriot Act

Which of the following is a federal law that provides a definition of the term cyberterrorism and under which young people primarily involved in what they consider to be minor computer pranks have been tried as cyberterrorist?

New cards
81

Dropper Code

Which of the following gets a rootkit installation started and can be easily activated by clicking on a link to a malicious Web site in an email or opening an infected PDF file?

New cards
82

Valid test results

The fundamental problem with trying to detect a rootkit is that the operating system cannot be trusted to provide which of the following?

New cards
83

Distributed Denial-of-Service Attack (DDoS)

What type of attack keeps the target so busy responding to a stream of automated requests that legitimate users cannot get in?

New cards
robot