Chapter 17: Information Security

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

motivations for hacking

-account theft or illegal funds transfer -stealing personal or financial data -compromising computer assets for use in other crimes -extortion -intellectual property theft -espionage -cyberwarfare -terrorism -pranksters -hacktivism (protest hacking) -revenge from disgruntled employees

user and admin threats

-bad apples in house -social engineering -phishing -passwords

the goal of the malware

-botnets or zombie networks -malicious adware -spyware -keylogger -screen capture -card skimmer -RAM scraping or storage scanning software -ransomware -blended threats

action as an organization

-frameworks, standards, and compliance -education, audit, and enforcement -technology's role

examples of social engineering

-impersonating senior management -identifying a key individual as a supposed friend -making claims with confidence and authority -baiting someone to add/deny/clarify information -using harassment, guilt, or intimidation -using flirtation or charm to gain info, favors, or access -setting off a series of false alarms to cause the victim to disable alarm systems -answering bogus surveys

technology threats

-malware -poorly designed software -push button hacking

technology's role

-patch -lock down hardware -lock down the network -lock down partners -lock down systems -have failure and recovery plans

action as a user

-surf smart -stay vigilant -stay updated -stay armed -be settings smart -be password savvy -be disposal smart -back up -check with your administrator

methods of malware infection

-viruses -worms -trojans

Screen capture

A type of keylogger that records pixels that appear on a user's screen to identify proprietary information

Blended threats

Attacks combining multiple malware or hacking exploits

zero-day exploit

Attacks that are so new that they have not been clearly identified and so they haven't made it to the security screening

Card skimmer

Captures data from a card's magnetic strip

Key

Code that unlocks encryption

RAM scraping or storage scanning software

Malicious code that scans computing memory (RAM, hard drives, or other storage) for sensitive data, often looking for patterns such as credit card or Social Security numbers

Malicious adware

Programs installed without full user consent or knowledge that later serve unwanted advertisements

Spoofed

Refers to forging or disguising the origin/identity

Executables

Running program

Spyware

Software that monitors and reports a user's computing habits

Social Engineering

Tricking employees into revealing information or performing other tasks by pretending to be legitimate members of the company in need of information

black hat hackers

a computer criminal

phishing

a con executed using technology, typically targeted at acquiring sensitive information or tricking someone into installing malicious software

hacktivists

a protester seeking to make a political point by leveraging technology tools often through system infiltration, defacement, or damage

honeypots

a seemingly tempting but bogus target meant to draw hacking attempts

firewalls

a system that acts as a control for network traffic, blocking unauthorized traffic while permitting acceptable use

intrusion detection systems

a system that monitors network use for potential hacking attempts; blocks, isolates, or identifies infiltration attempts

certificate authority

a trusted third party that provides authentication services in public key encryption schemes

public key encryption

a two key system used for securing electronic transmissions; a public key locks data and a private key unlocks it

brute-force attacks

an attack that exhausts all possible password combinations in order to break into an account

DDoS

an attack where a firm's computer systems are flooded with thousands of seemingly legitimate requests, the sheer volume of which will slow or shut down the site's use; usually performed via botnets

policies need eyes and teeth. eyes being ___ and teeth being ___

audit; enforcement

dumpster diving

combing through trash to identify valuable assets

CAPTCHAs

completely automated public turing test to tell computers and humans apart; the scrambled character images that users must enter

Heartland case shows what

compliance does NOT = security

cash-out fraudsters

criminals that purchase assets from data harvesters to be used for illegal financial gain (ie. stolen credit cards to buy goods, creating fake accounts via identity fraud, etc)

data harvesters

cybercriminals who infiltrate systems and collect data for illegal resale

turing test

distinguishes if a task is being performed by a computer or a human

Ransomware

encrypts files and demands users to pay to regain control

trojans

exploits that try to sneak in by masquerading as something they're not

shoulder surfing

gaining compromising information through observation

whitelists

highly restrictive programs that permit communication only with approved entities and/or in an approved manner

botnets

hordes of surreptitiously infiltrated computers liked and controlled remotely; zombie networks

Malware

malicious software

hacker

may be applied to either someone who breaks into computer systems or to a particularly clever programmer

hack

may mean breaking into a computer system or a particularly clever solution

Stuxnet

most notorious act of cyberwarfare yet; launched by either US or Israeli intelligence to eliminate Iranian uranium warheads

blacklists

programs that deny the entry or exit of specific IP addresses, products, internet domains, and other communication restrictions

viruses

programs that infect other software or files and require an executable running program; need an executable to run and can spread through OS, USBs, DVDs

worms

programs that take advantage of security vulnerability to automatically spread, but unlike viruses, do not require an executable; scan and install themselves

encryption

scrambling data using a code or formula known as a cipher such that it is hidden from those who do not have the unlocking key

white hat hackers

someone who uncovers computer weaknesses without exploiting them with the goal of improving system security

biometrics

technologies that measure and analyze human body characteristics for identification or authentication

Keylogger

using spyware to record a user's keystrokes; can be hardware or software

multi-factor authentication

when identity is proven by presenting more than one item for proof of credentials


Set pelajaran terkait

Unit 4: Basic Psychosocial Needs

View Set

Ch.3-a- Cells, tissues, organs-Metabolism-Digestions

View Set

Ch15: Organizational Change BUSI 240

View Set

Music Appreciation Chapter 5 Quiz

View Set

ch. 17 store layout, design and visual merchandising

View Set