Information Security: Chapter 2

Descrição

Flashcards on Learning Unit 2
marcb176
FlashCards por marcb176, atualizado more than 1 year ago
marcb176
Criado por marcb176 mais de 9 anos atrás
127
0

Resumo de Recurso

Questão Responda
Threat An object, person, or other entity that presents an ongoing danger to an asset.
Theft The illegal taking of another’s property, which can be physical, electronic, or intellectual.
Virus Consists of segments of code that perform malicious actions
Worm A malicious program that replicates itself constantly, without requiring another program environment
Trojan horses Software programs that hide their true nature and reveal their designed behavior only when activated
Back door Component in a system, which allows the attacker to access the system at, will with special privileges
Polymorphic threat One that over time changes the way it appears to antivirus software programs, making it undetectable by techniques that look for preconfigured signatures
Virus hoaxes e-mails warning of supposedly dangerous viruses that don’t exist
Trespass Unauthorized real or virtual actions that enable information gatherers to enter premises or systems they have not been authorized to enter
Shoulder surfing Used in public or semi-public settings when individuals gather information they are not authorized to have by looking over another individual’s shoulder or viewing the information from a distance
Hackers “people who use and create computer software [to] gain access to information illegally.”
Script kiddies Hackers of limited skill who use expertly written software to attack a system
Packet monkeys Script kiddies who use automated exploits to engage in distributed denial-of-service attacks
Human Error or Failure Acts performed without malicious intent
Information Extortion Attacker steals information from computer system and demands compensation for its return or nondisclosure
TRUE or FALSE A worm requires that another program is running before it can begin functioning FALSE
TRUE Or FALSE Much human error or failure can be prevented with training and ongoing awareness activities TRUE
TRUE Or FALSE Information security’s primary mission is to ensure that systems and their contents retain their confidentiality at all costs FALSE
TRUE Or FALSE A firewall is a mechanism that keeps certain kinds of network traffic out of a private network TRUE
TRUE Or FALSE A worm can deposit copies of itself onto all Web servers that the infected system can reach, so that users who subsequently visit those sites become infected TRUE
List at least six general categories of threat - Malicious Code - Back Doors - Hoaxes - Password Crack - Denial of Service and Distribution - Spoofing
What is a Worm? A worm is a malicious program that replicates itself constantly, without requiring another environment. Worms can continue replicating themselves until they completely fill available resources, such as memory, hard drive space, and network bandwidth.

Semelhante

Types of Attacks
River L.
Threats
marnus.db
Infection and response
Brodie McMeowface
"TRIADA ECOLOGICA"
Arely Reyes
virus informatico
Irving Aranda
Microbiology Practical F
Elle Ashe
Human Immunodeficiency Virus (HIV)
Matthew Coulson
La historia de los lenguajes de programación
LUIS ALFREDO CAICEDO ESCOBAR