7.4.2.1.1. Insider Threats Flashcards
What is a server-based, web-accessible program part of the Microsoft Office suite?
SharePoint
How many distinct EIM capabilities does SharePoint offer?
4
EIM
Enterprise Information Management
Which SharePoint workflow requests agreement from all involved parties?
Approval Workflow
How many workflow capabilities are available to you on a SharePoint Server?
3
what is a insider/ internal threat?
Threat originating inside a company, government agency, or institution.
What refers to measures and controls taken to deny unauthorized persons information derived from info systems of the US Government related to national security, and to ensure the authenticity of such info systems?
COMPUSEC
An unauthorized user attempts to gain as much info about the network as possible before launching other more serious types of attacks.
Reconnaissance Attack
An individual attempts to gain unauthorized access of computer resources
Access Attack
Is the unauthorized transfer of data outside an organization and is a significant concern with data leakage.
Data Theft / Data Exfiltration
Anyone who has legitimate access to an organization’s internal resources, but exploits this access for personal gain or damage against the organization.
Malicious Insider
Program that replicates by attaching itself to other programs.
Virus
Malicious programs that are carried to your computer by email.
Email-Borne Viruses
Computer software use to prevent, detect, and remove malicious computer viruses
Antivirus
What is one email virus protection?
Scans email transactions for viruses before forwarding to an SMTP Servers for delivery.
Symantec Mail Security for SMTP
What are some Virus Indicators?
- The computer runs more slowly.
- The computer stops responding or locks up often.
- The computer crashes or restarts every few minutes.
- Applications on the computer don’t work correctly.
- Disks or disk drives are inaccessible.
- Unable to print correctly.
- Unusual error messages.
- Menus and dialog boxes are distorted.