Chapter 9. Cybercrime and Information System Security

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/37

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

38 Terms

1
New cards

advanced persistent threat (APT)

A network attack in which an intruder gains access to a network and stays there—undetected—with the intention of stealing data over a long period of time.

2
New cards

antivirus software

Software that scans a computer’s memory, disk drives, and USB ports regularly for viruses.

3
New cards

blended threat

A sophisticated threat that combines the features of a virus, worm, Trojan horse, and other malicious code into a single payload.

4
New cards

botnet

A term used to describe a large group of computers, that are controlled from one or more remote locations by hackers, without the knowledge or consent of their owners.

5
New cards

bring your own device (BYOD)

A business policy that permits, and in some cases encourages, employees to use their own mobile devices (smartphones, tablets, or laptops) to access company computing resources and applications, including email, corporate databases, the corporate intranet, and the Internet.

6
New cards

CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart)

Software that generates and grades tests that humans can pass all but the most sophisticated computer programs cannot.

7
New cards

computer forensics

A discipline that combines elements of law and computer science to identify, collect, examine, and preserve data from computer systems, networks, and storage devices in a manner that preserves the integrity of the data gathered so that it is admissible as evidence in a court of law.

8
New cards

Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act

An act that states that it is legal to spam, provided the messages meet a few basic requirements.

9
New cards

cyberespionage

The deployment of malware that secretly steals data in the computer systems of organizations, such as government agencies, military contractors, political organizations, and manufacturing firms.

10
New cards

cyberterrorism

The intimidation of government or civilian population by using information technology to disable critical national infrastructure (e.g., energy, transportation, financial, law enforcement, emergency response) to achieve political, religious, or ideological goals.

11
New cards

data breach

The unintended release of sensitive data or the access of sensitive data by unauthorized individuals.

12
New cards

Department of Homeland Security (DHS)

A large federal agency with more than 240,000 employees and a budget of almost $65 billion whose goal is to provide for a “safer, more secure America, which is resilient against terrorism and other potential threats.”

13
New cards

distributed denial-of-service (DDoS) attack

An attack in which a malicious hacker takes over computers via the Internet and causes them to flood a target site with demands for data and other small tasks.

14
New cards

exploit

An attack on an information system that takes advantage of a particular system vulnerability.

15
New cards

firewall

A system of software, hardware, or a combination of both that stands guard between an organization’s internal network and the Internet and limits network access based on the organization’s access policy.

16
New cards

identity theft

The theft of personal information, which is then used without the owner’s permission, often to commit fraud or other crimes.

17
New cards

intrusion detection system (IDS)

Software and/or hardware that monitors system and network resources and activities and notifies network security personnel when it detects network traffic that attempts to circumvent the security measures of a networked computer environment.

18
New cards

logic bomb

A form of Trojan horse malware that executes when it is triggered by a specific event.

19
New cards

managed security service provider (MSSP)

A company that monitors, manages, and maintains computer and network security for other organizations.

20
New cards

next-generation firewall (NGFW)

A hardware- or software-based network security system that is able to detect and block sophisticated attacks by filtering network traffic dependent on the packet contents.

21
New cards

phishing

The act of fraudulently using email to try to get the recipient to reveal personal data.

22
New cards

ransomware

Malware that stops you from using your computer or accessing your data until you meet certain demands such as paying a ransom or sending photos to the attacker.

23
New cards

reasonable assurance

The IS security concept that recognizes that managers must use their judgment to ensure that the cost of control does not exceed the system’s benefits or the risks involved.

24
New cards

risk assessment

The process of assessing security-related risks to an organization’s computers and networks from both internal and external threats.

25
New cards

rootkit

A set of programs that enables its user to gain administrator-level access to a computer without the end user’s consent or knowledge.

26
New cards

security audit

A careful and thorough analysis that evaluates whether an organization has a well-considered security policy in place and if it is being followed.

27
New cards

security policy

A statement that defines an organization’s security requirements, as well as the controls and sanctions needed to meet those requirements.

28
New cards

smishing

Another variation of phishing that involves the use of Short Message Service (SMS) texting.

29
New cards

spam

The use of email systems to send unsolicited email to large numbers of people.

30
New cards

spear-phishing

A variation of phishing in which the phisher sends fraudulent emails to a certain organization’s employees.

31
New cards

Trojan horse

A seemingly harmless program in which malicious code is hidden.

32
New cards

U.S. Computer Emergency Readiness Team (US-CERT)

A partnership between the Department of Homeland Security and the public and private sectors; established to provide timely handling of security incidents as well as conducting improved analysis of such incidents.

33
New cards

virus

A piece of programming code, usually disguised as something else, that causes a computer to behave in an unexpected and usually undesirable manner.

34
New cards

virus signature

A sequence of bytes that indicates the presence of a specific virus.

35
New cards

vishing

Similar to smishing except that the victims receive a voice mail message telling them to call a phone number or access a Web site.

36
New cards

worm

A harmful program that resides in the active memory of the computer and duplicates itself.

37
New cards

zero-day attack

An attack that takes place before the security community and/or software developers become aware of and fix a security vulnerability.

38
New cards

zombie

A computer that has been taken over by a hacker to be used as part of a botnet.

Explore top flashcards

Medical terma quiz 4
Updated 409d ago
flashcards Flashcards (44)
Skull
Updated 5h ago
flashcards Flashcards (47)
Integrals
Updated 665d ago
flashcards Flashcards (41)
Ch13-14 Civics
Updated 1034d ago
flashcards Flashcards (45)
List 35
Updated 1098d ago
flashcards Flashcards (35)
Medical terma quiz 4
Updated 409d ago
flashcards Flashcards (44)
Skull
Updated 5h ago
flashcards Flashcards (47)
Integrals
Updated 665d ago
flashcards Flashcards (41)
Ch13-14 Civics
Updated 1034d ago
flashcards Flashcards (45)
List 35
Updated 1098d ago
flashcards Flashcards (35)