IS 430 Chapter 4

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/32

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

33 Terms

1
New cards

Wed security Goals

Users want to safely browse the web:

No theft

No eavesdropping

Assurance of who/what you're communicating with

2
New cards

Three attack vectors against a browswer

1) go after the OS so it will impede browser's correct and secure functioning

2) Tackle the browser or ones its components, add-ons, or plug-ins so activity is altered

3) Intercept or modify communication to or from browser

3
New cards

Browser Attack Types

Man-in-the browser

Keystroke logger

page-in-the-middle

Program download substitution

User-in-the-middle

4
New cards

Man-in-the-browser

Trojan horse that intercepts data passing through the browser

5
New cards

Keystroke logger

hardware or software that records all keystrokes entered

6
New cards

Page-in-the-Middle

User is directed to a different page than believed or intended

7
New cards

Program Download Substitution

Attacker creates a page with seemingly innocuous and desirable programs for download

8
New cards

User-in-the-Middle

Using click-bait to trick users into solving CAPTCHAs on spammers behalf

9
New cards

Authentication is vulnerable at these points

Usability and accuracy

computer-to-computer interaction

Malicious software

Each side of computer interchange needs assurance of authentic identity

10
New cards

shared secret

something only the two entities on the end should know

11
New cards

one time password

good for only one use. To use it the two end parties need to have a shared secret list of passwords.

12
New cards

Out-of-band communication

transferring one fact along a communication path separate from that of another fact.

13
New cards

website defacement

an attacker replaces or modifies the content of a legitimate web site.

14
New cards

fake website

The attacker gets all the images a real site uses

15
New cards

Protecting web sites against change

Integrity checksums

signed code or data

16
New cards

Malicious web content

substitute content on a real web site

web bug

Clickjacking

Drive-by-download

17
New cards

web bug

tiny action points that can report page traversal patterns to central collecting points

18
New cards

clickjacking

Tricking a user into clicking a link by disguising what the link points to

19
New cards

Drive-By-Download

attack in which code is downloaded,installed, and executed on a computer without the user's permission

20
New cards

T/F Access control accomplishes separation, keeping two classes of things apart

True

21
New cards

Cross-Site Scripting (XSS)

executable code is included in the interaction between client and server and executed by the client or server.

22
New cards

persistent cross-site scripting attack

Server interprets and executes the script or saved the script and returns it to other clients

23
New cards

SQL Injection

inserting code into an exchange between a client and a database server

24
New cards

Service side include

takes advantage of the fact that web pages can be organized to invoke a particular function automatically.

25
New cards

pump and dump

a trader pumps, artificially inflates the stock price by rumors and a surge in activity. Traders dumps it when it gets high enough.

26
New cards

Screeners

tools to automatically identify and quarantine or delete spam.

27
New cards

Volume limitations

limit the volume of a single sender or single email system.

28
New cards

Postage

small charged for each email message send

29
New cards

Phising

email message tries to trick the recipient into disclosing private data or taking another unsafe action.

30
New cards

spear phishing

tempts recipients by seeming to come from sources the receiver knows and trusts.

31
New cards

PGP (Pretty Good Privacy)

A key-based encryption system for e-mail that uses a two-step verification process.

32
New cards

S/MIME (Secure/Multipurpose Internet Mail Extensions)

perform security transformations very similar to those for PGP

33
New cards

Difference between PGP and S/MIME

Method of key exchange. Basic PGP depends on each user's exchanging keys with all potential recipients and establishing trusted recipients. S/MIME uses hierarchically validated certificates.