Create
Learn
Share

InfoSec 2

rename
buntfu's version from 2012-03-08 07:46

Section

Question Answer
In the well-known ____ attack, an attacker monitors (or sniffs) packets from the network, modifies them, and inserts them back into the network.man-in-the-middle
In a ____ attack, the attacker sends a large number of connection or information requests to a target.denial-of-service
A ____ is an attack in which a coordinated stream of requests is launched against a target from many locations at the same time.distributed-denial-of-service-attacks
According to Mark Pollitt, ____ is the premeditated, politically motivated attacks against information, computer systems, computer programs, and data which result in violence against noncombatant targets by subnational groups or clandestine agents.cyber-terrorism
One form of online vandalism is ____ operations, which interfere with or disrupt systems to protest the operations, policies, or actions of an organization or government agency.Hacktivist
Acts of ____ can lead to unauthorized real or virtual actions that enable information gatherers to enter premises or systems they have not been authorized to enter.Trespass
loss of power for a moment is known asPower fault
As frustrating as viruses and worms are, perhaps more time and money is spent on resolving virus ____.hoaxes
____ are software programs that hide their true nature, and reveal their designed behavior only when activated.Trojan Horses
Attempting to reverse-calculate a password is called _________________Cracking
A _______ attack involves the interception of cryptographic elements to determine keys and encryption algorithms.Timing
Script ____________________ are hackers of limited skill who use expertly written software to attack a system.kiddies
A virus or worm can have a payload that installs a(n) ____________________ or trap door component in a system, which allows the attacker to access the system at will with special privileges.backdoor
β€œ4-1-9” fraud is an example of a ____ attack.social engineering
Some information gathering techniques are quite legal, for example, using a Web browser to perform market research. These legal techniques are called, collectively, competitive ____________________.intelligence
A(n) ____________________ is a malicious program that replicates itself constantly, without requiring another program environment.Worm
Can deposit copies of itself onto all Web servers that the infected system can reach, so that users who subsequently visit those sites become infected.Worms
Duplication of software-based intellectual property is more commonly known as software ____________________piracy
Property is defined as β€œthe ownership of ideas and control over the tangible or virtual representation of those ideas.” Intellectual
Can present some of the most dangerous threats, because they are usually occur with very little warning and are beyond the control of people.Forces of Nature
Two watchdog organizations investigate allegations of software abuse(SIIA), formerly known as the Software Publishers Association, and the Business Software Alliance (BSA)
A _______ is a mechanism that keeps certain kinds of network traffic out of a private network.firewall
Safeguards the technology assets in use at the organization.Information Security
A(n) ____________________ is an object, person, or other entity that represents an ongoing danger to an asset.Threat
A(n) _________ threat is one that over time changes the way it appears to antivirus software programs, making it undetectable by techniques that look for preconfigured signatures. polymorphic
At least 6 categories of threats.Software Attacks, Forces of Nature, Human Error, Sabotage, Theft, Obsolete
memorize

Recent badges