How can we help?

You can also find more resources in our Help Center.

Study sets matching "computer chapter 2 security"

Study sets
Classes
Users

Study sets matching "computer chapter 2 security"

82 terms
Computer Security chapter2
Motherboard
Hardware runs
Firmware runs
Software runs
CPU, I/O, BIOS, Daughterboard: RAM (data resides in RAM), ROM
Firmware
as part of hardware
OS and Apps
Motherboard
CPU, I/O, BIOS, Daughterboard: RAM (data resides in RAM), ROM
Hardware runs
Firmware
58 terms
Comptia Security+ Chapter 2: Computer Systems Security
Malware
Virus
Worm
Trojan Horse
Software designed to infiltrate a computer system and possibl…
Code that runs on a computer without the user's knowledge; it…
Code that runs on a computer without the user's knowledge; ab…
An application that appears to perform desired functions but…
Malware
Software designed to infiltrate a computer system and possibl…
Virus
Code that runs on a computer without the user's knowledge; it…
33 terms
Comptia Security+ Chapter 2: Computer Systems Security
Malware
Virus
Worm
Trojan Horse
Software designed to infiltrate a computer system and possibl…
Code that runs on a computer without the user's knowledge; it…
Code that runs on a computer without the user's knowledge; ab…
An application that appears to perform desired functions but…
Malware
Software designed to infiltrate a computer system and possibl…
Virus
Code that runs on a computer without the user's knowledge; it…
39 terms
Chapter 2 - Computer Systems Security
Virus
Worm
Trojan
Ransomware
Code that runs on a computer without the user's knowledge, it…
Code that runs on a computer without the user's knowledge, se…
An application that appears to perform desired functions but…
Type of malware that restricts access to a computer system an…
Virus
Code that runs on a computer without the user's knowledge, it…
Worm
Code that runs on a computer without the user's knowledge, se…
33 terms
Chapter 2: Computer Systems Security
Malware
Virus
Worm
Trojan Horse
Software designed to infiltrate a computer system and possibl…
Code that runs on a computer without the user's knowledge; it…
Code that runs on a computer without the user's knowledge; a…
An application that appears to perform desired functions but…
Malware
Software designed to infiltrate a computer system and possibl…
Virus
Code that runs on a computer without the user's knowledge; it…
79 terms
Chapter 2 Computer Security Basics
Administrator account type
Adware
Authentication
Authorization
User can perform systemwide tasks that affect the overall ope…
Form of spyware that collects information about the user in o…
Validation of a user account and password that occurs before…
The process of both authenticating a user and determining the…
Administrator account type
User can perform systemwide tasks that affect the overall ope…
Adware
Form of spyware that collects information about the user in o…
Chapter 2 : Computing Security and Ethics
What is a hacker
What is phreaking
What is a script kiddle
What is hacktivism
A person who breaks into a computer system
Subverting the phone system to get free service
An amateur hacker who simply uses the hacking tools developed…
Cracking into a system as a political act
What is a hacker
A person who breaks into a computer system
What is phreaking
Subverting the phone system to get free service
31 terms
Principles of Computer Security Chapter 2
operational model of computer security
host security
three ways to protect organization net…
prevention technologies
protection = prevention + (detection + response)
protect each computer and device individually
1. do nothing- use out-of-the-box software tools 2. host secu…
access controls, firewalls, encryption
operational model of computer security
protection = prevention + (detection + response)
host security
protect each computer and device individually
33 terms
Chapter 2 : Computing Security and Ethics
hacker
phreaking
script kiddle
hacktivism
A person who breaks into a computer system
Subverting the phone system to get free service
An amateur hacker who simply uses the hacking tools developed…
Cracking into a system as a political act
hacker
A person who breaks into a computer system
phreaking
Subverting the phone system to get free service
Principles Of Computer Security Chapter 2
What is the most common form of authen…
The CIA of security includes:... A) Conf…
The security principle used in the Bel…
Which of the following concepts requir…
Correct Answer is : C
Correct Answer is : B
Correct Answer is : A
Correct Answer is : D
What is the most common form of authen…
Correct Answer is : C
The CIA of security includes:... A) Conf…
Correct Answer is : B
21 terms
Computer Security Midterm CH 2
T
T
T
F
Many security administrators view strong security as an imped…
In the context of security our concern is with the vulnerabil…
Hardware is the most vulnerable to attack and the least susce…
Contingency planning is a functional area that primarily requ…
T
Many security administrators view strong security as an imped…
T
In the context of security our concern is with the vulnerabil…
44 terms
Ch2 - Computer Security Basics
cybercrime
malware
exploit
zero-day exploit
illegal activity performed using computer technology
software threats that can target all types of computer device…
a malware attack or other software compromise that takes adva…
an unknown exploit or vulnerability in a software or computer…
cybercrime
illegal activity performed using computer technology
malware
software threats that can target all types of computer device…
15 terms
Security+ Chapter 2
B
C
A
C
Harmful programs used to disrupt computer operation, gather s…
A computer program containing malicious segment that attaches…
In computer security, the part of malware code responsible fo…
Malicious software performing unwanted and harmful actions in…
B
Harmful programs used to disrupt computer operation, gather s…
C
A computer program containing malicious segment that attaches…
23 terms
Computer Security Chpt 2
The process of providing proof that th…
Each of the following is a characteris…
Relying on deceiving someone to obtain…
The goal of a phishing attack is.
Authentication
it is complicated
Social engineering
to trick a user into surrendering personal information
The process of providing proof that th…
Authentication
Each of the following is a characteris…
it is complicated
171 terms
Corporate Computer Security - Chapters 1, 2, 3
Threat environment
Confidentiality
Integrity
Availability
the types of attackers and attacks that companies face
people cannot read sensitive information, while on a computer…
attackers cannot change or destroy information, while on a co…
people who are authorized to use information are not prevente…
Threat environment
the types of attackers and attacks that companies face
Confidentiality
people cannot read sensitive information, while on a computer…
31 terms
Principles of Computer Security 2
operational model of computer security
host security
three ways to protect organization net…
prevention technologies
protection = prevention + (detection + response)
protect each computer and device individually
1. do nothing- use out-of-the-box software tools 2. host secu…
access controls, firewalls, encryption
operational model of computer security
protection = prevention + (detection + response)
host security
protect each computer and device individually
24 terms
Computer Security 2
Server
Proxy server
Printer servers
Files Server
A computer or device on a network that manages network resour…
A proxy server is a dedicated computer or a software system r…
A print server is a software application, network device or c…
server that allows users to save and load data/files.
Server
A computer or device on a network that manages network resour…
Proxy server
A proxy server is a dedicated computer or a software system r…
89 terms
Chapter 11 Computer Security
Computer Security Risk
Cybercrime
Crimeware
Hacker
any event or action that could cause a loss of or damage to c…
any online or Internet-based illegal act
software used by cybercriminals
refers to a person that access a computer or network illegally
Computer Security Risk
any event or action that could cause a loss of or damage to c…
Cybercrime
any online or Internet-based illegal act
33 terms
Computer Security Chapter 5
Algorithm
Block Cipher
Ciphertext
Collision Attack
a step-by-step, recursive computational procedure for solving…
segmenting the input data into blocks of a specified size, ty…
encrypted output from a cipher system
an attacker finds two different messages that hash to the sam…
Algorithm
a step-by-step, recursive computational procedure for solving…
Block Cipher
segmenting the input data into blocks of a specified size, ty…
26 terms
Computer Security Chapter 6
authority revocation list (ARL)
CA certificate
certificate
certificate authority (CA)
separate revocation list is maintained for CA keys that have…
can be self signed, or given with an hierarical model (furthe…
third party credential documents used to vouch for the trustw…
a trusted authority that certifies individuals' identities an…
authority revocation list (ARL)
separate revocation list is maintained for CA keys that have…
CA certificate
can be self signed, or given with an hierarical model (furthe…
31 terms
Principles of Computer Security Ch2
operational model of computer security
host security
three ways to protect organization net…
prevention technologies
protection = prevention + (detection + response)
protect each computer and device individually
1. do nothing- use out-of-the-box software tools 2. host secu…
access controls, firewalls, encryption
operational model of computer security
protection = prevention + (detection + response)
host security
protect each computer and device individually
10 terms
Computer Security Chapter 1
Unauthorized Disclosure
Exposure
Interception
Inference
A circumstance or event whereby an entity gains access to dat…
Sensitive data are directly released to an unauthorized entity
An unauthorized entity directly accesses sensitive data trave…
A threat action whereby an unauthorized entity indirectly acc…
Unauthorized Disclosure
A circumstance or event whereby an entity gains access to dat…
Exposure
Sensitive data are directly released to an unauthorized entity
14 terms
Computer Security Chapter 7
Certificate
Certificate Authority (CA)
Certificate Revocation List (CRL)
Internet Security Association and Key…
a data structure that binds a public key to subjects (unique…
responsible for issuing, storing, and revoking certificates--…
a digitally signed object that lists all of the current but r…
provides a method for implementing a key exchange protocol an…
Certificate
a data structure that binds a public key to subjects (unique…
Certificate Authority (CA)
responsible for issuing, storing, and revoking certificates--…
25 terms
Chapter #2 Computing Security and Ethics
Computer security affects
John Draper created
The term "hacker" originally had a neg…
The term "script kiddie" refers to what?
All users of computers
Software for Microsoft
false
Unsophisticated hacker (You can be any age to be a script kid…
Computer security affects
All users of computers
John Draper created
Software for Microsoft
68 terms
Security+ Chapter 2
risk
risk mitigation
security incident
security controls
the likelihood that a threat will exploit a vulnerability, re…
uses controls to reduce risk
an adverse event or series of events that can negatively affe…
attempt to prevent or limit the impact of a security incident
risk
the likelihood that a threat will exploit a vulnerability, re…
risk mitigation
uses controls to reduce risk
157 terms
Corporate Computer Security - Chapters 1, 2, 3
Threat environment
Confidentiality
Integrity
Availability
the types of attackers and attacks that companies face
people cannot read sensitive information, while on a computer…
attackers cannot change or destroy information, while on a co…
people who are authorized to use information are not prevente…
Threat environment
the types of attackers and attacks that companies face
Confidentiality
people cannot read sensitive information, while on a computer…
45 terms
Security+ Chapter 2
Social Engineering
Types of Social Engineering
Spoofing
Impersonation
Attack using deception and trickery to convince unsuspecting…
• Spoofing... • Impersonation... • Hoax... • Phishing... • Vishing... • Whal…
Human or software based attack where the goal is to pretend t…
Human based attack where an attacker pretends to be someone t…
Social Engineering
Attack using deception and trickery to convince unsuspecting…
Types of Social Engineering
• Spoofing... • Impersonation... • Hoax... • Phishing... • Vishing... • Whal…
157 terms
Corporate Computer Security - Chapters 1, 2, 3
Threat environment
Confidentiality
Integrity
Availability
the types of attackers and attacks that companies face
people cannot read sensitive information, while on a computer…
attackers cannot change or destroy information, while on a co…
people who are authorized to use information are not prevente…
Threat environment
the types of attackers and attacks that companies face
Confidentiality
people cannot read sensitive information, while on a computer…
44 terms
Chapter 2 security
Replay attack
SQL INjection
DNS poisoning
DIRECTORY TRAVERSAL
Makes a copy of the transmission for use at a later time
Displays a list of customer telephone numbers.discover the na…
Substitutes DNS addresses so that the computer automatically…
Involves an attacker accessing files in directories other tha…
Replay attack
Makes a copy of the transmission for use at a later time
SQL INjection
Displays a list of customer telephone numbers.discover the na…
38 terms
Security + Chapter 2
Adware
Armored Virus
Backdoor
Bot Herder
A software program that delivers advertising content in a man…
A virus that goes to great lengths in order to avoid detection.
Software code that gives access to a program or a service tha…
An attacker who controls a botnet.
Adware
A software program that delivers advertising content in a man…
Armored Virus
A virus that goes to great lengths in order to avoid detection.
15 terms
Computer Security Chapter 12
Why does WTLS support short key lengths?
Why should wireless have strong two-wa…
Why is 802.11 wireless more of a secur…
Bluebugging can give an attacker what?
WTLS has to support devices with low processor power and limi…
Strong authentication is needed so that all virus definitions…
It provides access to the physical layer of Ethernet without…
Total control over a mobile phone
Why does WTLS support short key lengths?
WTLS has to support devices with low processor power and limi…
Why should wireless have strong two-wa…
Strong authentication is needed so that all virus definitions…
20 terms
Computer Security Chapter 4
Each of the following is true about th…
What is the format used to write World…
A(n) ______ identifies the program or…
Which of these protocols handles outgo…
It is a local network of computers and networks.
Hypertext Markup Language (HTML)
port number
Simple Mail Transfer Protocol (SMTP)
Each of the following is true about th…
It is a local network of computers and networks.
What is the format used to write World…
Hypertext Markup Language (HTML)
31 terms
Intro to Computer Security ch 2.
Symmetric encryption aka conventional…
two requirements for symmetric encrypt…
two type of symmetric encryption attacks
cryptanalytic attack
universal method for providing confidentiality for transmitte…
needs a strong encryption algorithm, and sender and receiver…
cryptanalytic and brute force attacks
exploits logical weakness of the algorithm by using cipher text
Symmetric encryption aka conventional…
universal method for providing confidentiality for transmitte…
two requirements for symmetric encrypt…
needs a strong encryption algorithm, and sender and receiver…
98 terms
Security Chapter 2
Social Engineering Attack
Social engineering is one of the most…
Spoofing
Impersonation
is a type of attack that uses deception and trickery to convi…
...
This is a human-based or software-based attack where the goal…
this is a human-based attack where an attacker pretends to be…
Social Engineering Attack
is a type of attack that uses deception and trickery to convi…
Social engineering is one of the most…
...
11 terms
Cyber Security - Chapter 2
User
Hardware
Application
Operating System
People interacting with the computer.
The collection of physical components used to create a comput…
A computer program that provides a specific function.
A highly complex computer program typically consisting of mil…
User
People interacting with the computer.
Hardware
The collection of physical components used to create a comput…
25 terms
Chapter 11: Computer Security
What is extremely easy to breach?
What includes programs specifically in…
What malware doesn't need to attach it…
What is the name of Google's advertisi…
An unsecured computer
Malware
Worm
AdSense
What is extremely easy to breach?
An unsecured computer
What includes programs specifically in…
Malware
Computer Security - Tutorial 2
Define Cryptology
Define Cryptography
Define Cryptanalysis
What are the methods of Cryptanalysis
Research into the study of encryption and decryption
Hidden writing.
Studies encryption and encrypted messages, with the goal of f…
• Attempt to break a single message.... • Attempt to recognize p…
Define Cryptology
Research into the study of encryption and decryption
Define Cryptography
Hidden writing.
75 terms
Information Security Chapter 2
Compared to Web site defacement, vanda…
A mail bomb is a form of DoS.
Intellectual property is defined as "t…
Information security's primary mission…
False
True
True
False
Compared to Web site defacement, vanda…
False
A mail bomb is a form of DoS.
True
Chapter 11: Computer Security
What is extremely easy to breach?
What includes programs specifically in…
What malware doesn't need to attach it…
What is the name of Google's advertisi…
An unsecured computer
Malware
Worm
AdSense
What is extremely easy to breach?
An unsecured computer
What includes programs specifically in…
Malware
Chapter 11: Computer Security
How does a website know so much when y…
What malware does not need to attach i…
What is the name of Google's advertisi…
What is the most uncomplicated Interne…
Tracking Cookie
Worm
AdSense
Purchase Scam
How does a website know so much when y…
Tracking Cookie
What malware does not need to attach i…
Worm
29 terms
Corporate Computer Security Fourth Edition Randall J. Boyle/Raymond R. Pablo Chapter 2 Terms
Formal Processes
Formal Top-Level Security Management P…
SDLC
SNMP
Planned Series of actions
Plan-Protect-Respond Cycle
Systems Development Life Cycle
Simple Network Management Protocol
Formal Processes
Planned Series of actions
Formal Top-Level Security Management P…
Plan-Protect-Respond Cycle
26 terms
Chapter 9 - Computer Security
Ways a computer catches a virus
Ways an antivirus detects a virus
Malware
Spyware
Downloading infected files from web sites, emails, shared USB…
Looking for a virus signature
Softare that has malicious intent
Unwanted piggybacking program that usually downloads with oth…
Ways a computer catches a virus
Downloading infected files from web sites, emails, shared USB…
Ways an antivirus detects a virus
Looking for a virus signature
38 terms
Security Chapter 2
oligomorphic malware
pharming
phishing
polymorphic malware
Malware that changes its external code to one of a set number…
A phishing attack that automatically redirects a user to a fa…
Sending an email or displaying a web announcement that falsel…
Malware code that completely changes from its original form w…
oligomorphic malware
Malware that changes its external code to one of a set number…
pharming
A phishing attack that automatically redirects a user to a fa…
Security+ Vocabulary: Chapter 2
Adware
Armored Virus
Backdoor
Bot Herder
A software program that delivers advertising content in a man…
A Virus that goes to great lengths in order to avoid detection.
Software code that gives access to a program or a service tha…
An attacker that controls a botnet
Adware
A software program that delivers advertising content in a man…
Armored Virus
A Virus that goes to great lengths in order to avoid detection.
25 terms
Cyber Security Chapter 2
Adware
Backdoor
Bonet
Computer Virus
A software program that delivers advertising content in a man…
Software code that gives access to a program or a service tha…
A logical computer network of zombies under the control of an…
A malicious computer code that likes its biological counterpa…
Adware
A software program that delivers advertising content in a man…
Backdoor
Software code that gives access to a program or a service tha…
103 terms
Computer Security 260 Chapters 2 - 10
The CIA of Security
Operational Model of Security
Least Privilege
Separation of Duties
Confidentiality, Integrity, Availability
Protection = Prevention + (Detection + Response)
A subject should have only the necessary rights and privilege…
For any given task, more than one individual needs to be invo…
The CIA of Security
Confidentiality, Integrity, Availability
Operational Model of Security
Protection = Prevention + (Detection + Response)
10 terms
Computer Security-Chapter 8
Intruder behaviors
Intrusion detection systems(IDSs)
Intrusion prevention systems(IPSs)
Security Intrusion
1. Target acquisition and information gathering... 2. Initial ac…
...
...
A security event, or a combination of multiple security... event…
Intruder behaviors
1. Target acquisition and information gathering... 2. Initial ac…
Intrusion detection systems(IDSs)
...
9 terms
Computer Security Chapter 3
User Authentication-RFC2828
Authentication Process
Authentication Process-continued
User Authentication: the 4 means
The process of verifying an identity claimed by... or for a syst…
fundamental building... block and primary... line of defense... basis…
identification step... presenting an identifier... to the securit…
something the individual knows... something the individual posse…
User Authentication-RFC2828
The process of verifying an identity claimed by... or for a syst…
Authentication Process
fundamental building... block and primary... line of defense... basis…
72 terms
Chapter 11: Computer Security
Tracking Cookie
Worm
AdSense
Purchase Scam
How does a website know so much when you return to it?
What malware does not need to attach itself to an existing pr…
What is the name of Google's advertising network?
What is the most uncomplicated Internet fraud?
Tracking Cookie
How does a website know so much when you return to it?
Worm
What malware does not need to attach itself to an existing pr…
25 terms
Security +: Chapter 2
Adware
Backdoor
Botnet
Computer Virus
A software program that delivers advertising content in a man…
Software code that gives access to a program or a service tha…
A logical computer network of zombies under the control of an…
A malicious computer code that, like its biological counterpa…
Adware
A software program that delivers advertising content in a man…
Backdoor
Software code that gives access to a program or a service tha…
1 of 10