1.1.3 Test out Notes Flashcards

1
Q

Security

A

the degree of protection against danger, damage, loss, and criminal activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Sophisticated Attacks

A

Complex so they are difficult to detect, blends into regular internet traffic to avoid detection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Proliferation of Attack Software

A

Variety of attack tools found on the internet that are as simple as downloading and choosing target.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Attack Scale and Velocity

A

Attacks on computers can be from hundreds to millions by just existing on the internet, this is because attacks have grown past just being physical.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Confidentiality

A

Confidentiality ensures that data is not disclosed to unintended persons, encryption is a method of insuring confidentiality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Integrity

A

ensures that data is not modified or tampered with, hashing can be used to achieve this

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Availability

A

Ensures the uptime of a network and systems ready when needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Non-repudiation

A

The confirmation of a messages source, digital signatures are used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Physical Security

A

includes all hardware and software needed to secure data, firewalls and anti virus softwares

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Users and Administrators

A

Users and administrators are the people who use the software and the people who manage the software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Policies

A

Rules a company may use to protect information and keep it secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Risk Management

A

Steps of indentifying security problems and choosing what things to do to counter future attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Asset

A

Something that holds value to a person or company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Threat

A

A entity that can cause damage to a company by exposing or stealing assets worth value or confidential.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Threat Agent

A

The person who causes or creates an attack, could be a disgruntled employee tired of dealing with the company.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Vulnerability

A

A vulnerability is a weakness that allows a threat to be carried out, biggest threats remain as storage devices that plug in and can steal data.

17
Q

Exploit

A

procedure or product that takes advantage of a vulnerability to carry out a threat

18
Q

Employee

A

If not always conscious of inside threats they can be the most hurtful attacks to a company.

19
Q

Spy

A

Employed by competing companies or groups to obtain sensitive information that would weaken competition

20
Q

Hacker

A

Any threat agent who uses there tech knowledge to bypass security to access information. The types can be Script Kiddies, Cybercriminals, and cyber-terrorists