Page 40 - DCAP309_INFORMATION_SECURITY_AND_PRIVACY
P. 40

Information  Security and Privacy




                    Notes          Card Skimmers: An unlawful electronic device that can capture all of the personal information
                                   from a credit card or debit card.
                                   Countermeasures: Action, device, procedure,  method or  other  measure  that decreases  the
                                   vulnerability of an information system.
                                   Data Driven Attack: A form of attack that is encoded in apparently inoffensive data, which is
                                   executed by a user or a  process to  execute an attack. A  data driven attack is a concern for
                                   firewalls, as it may get through the firewall in data form and begin an attack against a system at
                                   the back of the firewall.
                                   Denial of Service: Effect of any action or series of actions that averts any part of an information
                                   system from functioning.

                                   Dictionary Attack: An attack that accesses a brute-force technique of successively attempting all
                                   the words in some large, comprehensive list.
                                   DNS Spoofing: Assuming the DNS name  of another system  by either humiliating the  name
                                   service cache of a victim system, or by compromising a domain name server for a valid domain.
                                   Firewall: A firewall is a hardware or software solution to implement security policies.
                                   Flooding: Type of incident including insertion of a large volume of data effecting in denial of
                                   service.
                                   Hacker: Unauthorized user who tries to or gains access to an information system and the data it
                                   supports.
                                   Intrusion: Unauthorized act of bypassing the security techniques of a system.
                                   Malicious Code: Software efficient of performing an unauthorized process on an information
                                   system.
                                   Mobile Code: Software modules received from remote systems, transferred across a network,
                                   and then downloaded and implemented on a  local  system without  explicit installation  or
                                   execution by the recipient.
                                   Packet: A block of data sent over the network broadcasting the identities of the sending and
                                   receiving stations, error-control information, and message.
                                   Packet Filtering: A feature included into routers to restrict the flow of information based on
                                   predetermined communications like source, destination, or type of service being provided by
                                   the network.
                                   Packet Sniffer: A machine or program that observes the data traveling within computers on a
                                   network.
                                   Phishing: A type of scam with the  intention of obtaining personal information like  online
                                   banking user identification numbers, debit and credit card account numbers, and passwords.

                                   Probe: An effort to collect information about an information system for the apparent reason of
                                   circumventing its security controls.
                                   Proxy: Software agent that carries out a function or operation on behalf of another application
                                   or system while hiding the details involved.
                                   Replicator: Any program that acts to generate copies of itself. Examples include; a program, a
                                   worm, or virus.
                                   Retro-virus: A retro-virus is a virus that waits until all possible backup media are infected too,
                                   so that it is not possible to restore the system to an uninfected state.





          34                                LOVELY PROFESSIONAL UNIVERSITY
   35   36   37   38   39   40   41   42   43   44   45