Shared Flashcard Set

Details

Chapter 11 Network Security Threats
Key terms and definitions for MIS 483 Final SDS SHIN
55
Business
Undergraduate 4
05/13/2013

Additional Business Flashcards

 


 

Cards

Term
Malware
Definition
malicous software which represents a type of software code designed to cause destructive damages to infected systems and system users.
Term
Is the damage done from malware harmful to the software or the hardware?
Definition
Software-data, fioles, and software installed on the noeds
Term
What are the top three types of malware?
Definition
Trojans, Viruses and worms
Term
adware does what?
Definition
Displays uninvited advertisements
Term
What does Spyware do?
Definition
steals personal information and monitor/tracks
Term
Virus
Definition
An executable program and, if infected, can result in various effects ranging from mild annoyance to more serious damages to user data or programs installed in the system
Term
Worm
Definition
is a program designed to replicate itself and spread to other computers over the network without human interventions
Term
What is one of the most destructive effects of a worm?
Definition
Disrupted Network Performance
Term
What is one of the most destructive effects of a worm?
Definition
Disrupted Network Performance
Term
Trojan Horse
Definition
A malicious code sometimes hiding within a legitimate program downloaded from a website or sent in an email attachment and triggered on its execution
Term
What are Trojans designed to do?
Definition
Create a backdoor so that attackers obtain sneak access to a target system by bypassing the normal authentication and login procedure.
Term
What are some of the things that the hacker can accomplish once the Trojan is in place?
Definition
Uploading and downloading of files, planting zombies for subsequent DDOS attacks for the victims, stealing passwords and other sensitive information, installing spyware for keystroke monitoring and gathering email addresses for email distribution.
Term
Is it common for malware to combine multiple types of viruses?
Definition
Yes nowadays, many malware files use multiple types
Term
If you uninstall the software that has the malware, does it rollback the damage?
Definition
usually not because of the fact that malware generally changes settings permanently
Term
Do malware attacks occur at the application or operating system level?
Definition
BOTH
Term
What happens in an attack at the OS level?
Definition
The malware will change out OS files
Term
Fingerprinting
Definition
The checking of the software using hashtags
Term
How many sites should an IT professional use to check the integrity of the Hash Tags?
Definition
at a minimum or two or more mirror sites
Term
Hash function
Definition
an algorithm that maps large data sets of variable length to smaller data sets of a fixed length
Term
What are the methods used to steal passwords?
Definition
trial-and-errors(guesswork), Social engineering, phishing, login spoofing, malwares (ex. keystroke logging), and password cracking
Term
Password Cracking
Definition
uses software tools and brute processing capacity of a computer to obtain or steal user passwords
Term
Are hash values one-way or two way?
Definition
One way functions thus making them great for security authentication
Term
Brute Force Method
Definition
Breaks an encrypted or hashed password by trying every possible key/password exhaustively in an automated fashion using a computer's brute force.
Term
Dictionary method
Definition
attempts to reveal passwords by lining an electronic dictionary file that contains a list of dictionary words to password cracking software
Term
Can password cracking programs be used for good?
Definition
yes because systems administrators might use them to recover lost/forgotten passwords
Term
Is spoofing synonymous with masquerading?
Definition
YES!
Term
Spoofing/Masquerading
Definition
defined as pretending (or faking) to be someone or something
Term
IP and MAC Address Spoofing
Definition
IP Address-the source IP address is replaced with another one to mask the sender's true identity
Term
Can MAC spoofing be used to disrupt or degrade network performance?
Definition
Yes
Term
Email spoofing
Definition
an email sender can disguise/fake its originating email address
Term
Web Spoofing
Definition
Happens when a person is tricked into communication with a copycat website, not the original website.
Term
Web Spoofing
Definition
Happens when a person is tricked into communication with a copycat web site, not the original website.
Term
In web spoofing, does the fake website usually look like the original?
Definition
YES! they usually have the same logos...
Term
phishing
Definition
The process of tricking people into clicking on or going into some website.
Term
Denial or Service (DOS)
Definition
one or more attackers generate enough traffic targeting a particular server...with so much traffic it totally slows down the network.
Term
Pinging
Definition
A typical form of DOS attack floods a target server with requests for communication
Term
SYN Requests
Definition
flood the server with SYN messages (to pretend handshaking attempts)...this limits available resources for legitimate uses
Term
SYN Requests
Definition
flood the server with SYN messages (to pretend handshaking attempts)...this limits available resources for legitimate uses
Term
DDOS
Definition
(Distributed Denial of Service) for which zombie programs are planted in a number of innocent computers and they launch attacks to a target server at once
Term
MAC address flooding
Definition
a form of DOS attack on network switches, which disrupts or disables normal switching operations.
Term
What are the three ways to prevent MAC Address Flooding?
Definition
1) Allowing only one or more legitmate legitmate MAC address per port 2) automatic shutdown or a port if an unauthorized computer attempts to join it. 3) Shutting off all unused ports of switch
Term
Packet Sniffing
Definition
On the computer network is equivalent to the tire-tapping of telephone lines in an attempt to steal information.
Term
Wireshark (formerly Etheral)
Definition
A GUI tool that can sniff PDUs of popular protocols
Term
What mode can you prevent wireshark?
Definition
Switched Ethernet!
Term
Port Scanning
Definition
is an act of probing the ports of a target host in an automated fashion using a software tool
Term
What are some of the well known and most used ports?
Definition
80(HTTP), 21(FTP), 23(Telnet)
Term
When does port scanning occur?
Definition
At the early stages of an attack!
Term
Social engineering
Definition
A collection of non-technical approaches designed to manipulate people in an effort to obtain unauthorized access to a target system or to steal private and oftentimes confidential information.
Term
Are social engineering more or less dangerous than high-tech driven attacks?
Definition
More dangerous
Term
Man-In-The-Middle
Definition
Occurs when a hacker is able to intercept their messages and relay (or substitute) them as a middle man. The two communicating parties have no idea of the session hacking and believe that they are talking to valid partners.
Term
Spam
Definition
Primarily represents unsolicited commercial emails and becomes more of a nuisance unless it hides an executable harmful code. Spam is different from emails a recipient opts in to receive, oftentimes as a result of a marketing promotion by senders.
Term
Spam Spiders (spam bots)
Definition
are computer programs that can gather email addresses from various online sources including websites, mailing list archives, message boards, and online forms, and bring them back to their evil master for spamming
Term
Wardriving
Definition
With a utility tool anone can capture broadcasted WLAN frames while driving or walking around areas with WL
Term
Rogue WAP
Definition
generally means a WAP installed by an employee of a company for personal usage without obtaining the firm's authorization
Term
What is the next generation of the internet that will replace IPv4?
Definition
IPv6
Supporting users have an ad free experience!