• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/66

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

66 Cards in this Set

  • Front
  • Back

T/F


Large-scale data breaches continue to expose data about individuals to hackers and other cybercriminals

TRUE

TRUE OR FALSE


Mobile malware presents a tangible threat as smartphones and other mobile devices become more common targets

TRUE

TRUE OR FALSE


Distributed Denial of Service (DDoS) attacks are now capable of slowing Internet service within entire countries.

TRUE

Attacks where hackers target development environments to infect software that is then downloaded by end users

Software supply chain

TRUE OR FALSE


The more security measures added, the more difficult a site is to use, and the slower it becomes

TRUE

The three key points of vulnerability in e-commerce environment

1. Client


2. Server


3. Communications pipeline (Internet communications channels

Largest botnet that delivers various malicious payloads, including ransom ware. First appeared in 2017,became the most prevalent malware in 2018,and continued to have appeared in 2017,became the most prevalent malware in 2018,and continued to have an impact in 2019.


a) Emotet


b) Zeus


c) Conflicker

EMOTET

First appeared in 2017.


Exploits vulnerabilities in older versions of Windows operating systems, encrypts data, and demands a ransom payment to decrypt them


a) Emotet


b) Zeus


c) Wanna Cry

WannaCry

Variant of Zeus Trojan, focuses on the theft of authentication credentials and financial fraud.


Botnets spreading Citadel were targets of Microsoft/FBI action in 2012.


a) Citadel


b) Emotet


c) Conflicker

CITADEL

Sometimes referred to as king of financial malware.May install via driveby download and evades detection by taking control of web browser and stealing data that is exchanged with bank servers


a) Emotet


b) Zeus


c) Conflicker

Zeus

One of the most prevalent malicious code families still active. In operation since 2010, but largely disappeared in 2015 after the botnet that spread it was taken down. Remerged in 2016 to become one of the most common financial trojans.


a) Emotet


b) Zeus


c) Ramnit

Ramnit

First appeared in 2008.Targets Microsoft operating systems. Uses advanced malware techniques. Largest worm infection since Slammer in 2003.Used in 2017 in conjunction with various ransomware attacks


a) Ramnit


b) Zeus


c) Conflicker

Conficker

First appeared in early 2003.It spread by gathering target e-mail addresses from the computers, then infected and sent e-mail to all recipients from the infected computer. It was commonly used by bot networks to launch spam and DoS attacks.


a) Netsky.P


b) Storm


c) Conflicker

Netsky.P

First appeared in 2007.


It spread in a manner similar to the Netsky.P worm.Could also download and run other Trojan programs and worms


a) Netsky.P


b) Storm


c) Conflicker

Storm

First discovered in 2006. Spread by mass mailing;activated on the 3rd of every month, and attempted to destroy files of certain types


a) Netsky.P


b) Nymex


c) Conflicker

Nymex

First appeared in 2005.Well-known worm that infected a number of U.S. media companies.


a) Netsky.P


b) Zotob


c) Mydoom

Zotob

First appeared in 2004.One of the fastest spreading mass-mailer worms.


a) Netsky.P


b) Mydoom


c) Conflicker

Mydoom

Launched in 2003. Caused widespread problems.


a) Netsky.P


b) Mydoom


c) Slammer

Slammer

First spotted in 1999.At the time, the fastest spreading infectious program ever discovered.


It attacked Microsoft Word's Normal.dot global template, infecting all newly created documents and also mailed an infected Word file to the first 50 entries in each user's Microsoft Outlook Address Book


a) Melissa


b) Mydoom


c) Slammer

Melissa

includes a variety of threats such as viruses, worms, Trojan horses, and bots

Malicious code (malware, exploits)

Transforms data into cipher text readable only by sender and receiver


Secures stored information and information transmission


Provides 4 of 6 key dimensions of e-commerce security:

Encryption

4 key dimensions of e-commerce security:

Message integrity


Nonrepudiation


Authentication


Confidentiality

Sender and receiver use same digital key to encrypt and decrypt message

SYMMETRIC KEY ENCRYPTION

Length of binary key used to encrypt data

Data Encryption Standard (DES)

Most widely used symmetric key encryption


Uses 128-, 192-, and 256-bit encryption keys

Advanced Encryption Standard (AES)

Uses two mathematically related digital keys

PUBLIC KEY ENCRYPTION

Two mathematically related digital keys

Public key (widely disseminated)


Private key (kept secret by owner)

Widely disseminated


Choose the best answer


a. Public key


b. Private key

a. Public key

Kept secret by owner




Choose the best answer


a. Public key


b. Private key

b. Private key

True or false




Once key is used to encrypt message, same key cannot be used to decrypt message

TRUE

TRUE OR FALSE


Sender uses recipient’s PRIVATE key to encrypt message; recipient uses PUBLIC key to decrypt it

FALSE

Mathematical algorithm that produces fixed-length number called message or hash digest


Choose the best answer:


a. Hash function


b. Hash digest

a. Hash function

Address weaknesses of: Public key encryption Computationally slow, decreased transmission speed, increased processing time




Choose the best answer:


a. Digital envelope


b. Digital certificate

a. Digital envelope

Establishes secure, negotiated client–server session


a) Secure Sockets Layer (SSL) or Transport Layer Security (TLS)


b) Virtual Private Network (VPN)


c) Wireless (Wi-Fi) networks

a. Secure Sockets Layer (SSL)/Transport Layer Security (TLS)

Allows remote users to securely access internal network via the Internet




Choose the best answer:


a. Secure Sockets Layer (SSL)/Transport Layer Security (TLS)


b. Virtual Private Network (VPN)


c. Wireless (Wi-Fi) networks

b. Virtual Private Network (VPN)

Firewall can be a Hardware or a software


True or false

TRUE

Software servers that handle all communications from or sent to the Internet




a. Proxy servers


b. Firewall

Proxy servers (proxies)

A software, easiest and least expensive way to prevent threats to system integrity


Requires daily updates


Anti-virus software

Managing risk includes:

Technology


Effective management policies


Public laws and active enforcement

TYPES OF PAYMENT SYSTEM



Cash


Checking Transfer


Credit Card


Stored value


Accumulating balance

Most common form of payment Instantly convertible into other forms of value •No float


A. Cash


B. Checking Transfer

CASH

Second most common payment form in United States




A. Cash


B. Checking Transfer

CHECKING TRANSFER

Credit card associations, Issuing banks, Processing centers




A. Credit Card


B. Stored value


C. Accumulating balance

Credit card

Funds deposited into account, from which funds are paid out or withdrawn as needed


Debit cards, gift certificates, Peer-to-peer payment systems


A. Credit Card


B. Stored value


C. Accumulating balance

Stored value

Accounts that accumulate expenditures and to which consumers make period payments


Example: Utility, phone, American Express account


A. Credit Card


B. Stored value


C. Accumulating balance


Accumulating balance

TRUE OR FALSE


Large-scale data breaches continue to expose data about individuals to hackers and other cybercriminals

TRUE

TRUE OR FALSE


Mobile malware presents an intangible threat as smartphones and other mobile devices become more common targets of cybercriminals, especially as their use for mobile payments rise

FALSE - TANGIBLE

HARDWARE supply chain attacks is where hackers target development environments to infect software that is then downloaded by end users


TRUE OR FALSE

FALSE - software

These are the:


Browser parasites, Adware, Spyware

Potentially unwanted programs (PUPs)

These are the:


Social engineering


E-mail scams


Spear-phishing


Identity fraud/theft

PHISHING

These are the: Hackers vs. crackers


Types of hackers: White, black, grey hats


Hacktivism

HACKING

Types of hackers


hint: color

BLACK, WHITE, GREY HATS

Eavesdropping program that monitors information traveling over a network

SNIFFING

Disrupting, Defacing, destroying Web site

CYBERVANDALISM

this is used to protect internet communications

ENCRYPTION

Used in Securing channels of communication

SSL,VPNs

used to protecting networks, servers and clients

FIREWALL

Software servers that handle all communications from or sent to the Internet

Proxy servers (proxies)

PAYMENT SYSTEM STAKEHOLDERS

Consumers


Merchants


Financial intermediaries


Government regulators

Payment stakeholder that concerns low-risk, low-cost, refutable, convenience, reliability




A. Consumers


B. Merchants



CONSUMERS

Payment stakeholder that concerns low-risk, low-cost, irrefutable, secure, reliable




A. Merchants


B. Financial intermediaries


C.Government regulators

MERCHANTS

Payment stakeholder that concerns Secure, low-risk, maximizing profit




A. Consumers


B. Merchants


C. Financial intermediaries

FINANCIAL INTERMEDIARIES

Payment stakeholders that concerns security, trust, protecting participants and enforcing reporting


A. Financial intermediaries


B. Government regulators


C. Consumers


D. Merchants


GOVERNMENT REGULATORS

Use of mobile phones as payment devices


A. Online stored value systems


B. Mobile payment system

Mobile payment system

Mobile app designed to work with NFC chips




a. PayPal


b. Google wallet



Google Wallet

Verify transactions without central authority

blockchain