Ch. 3 Flashcards
smishing
another variation of phishing that involves the use of texting
vishing
similar to smishing except that the victims receive a voice-mail message telling them to call a phone number or access a website
cyberterrorism
intimidation of government or civilian population by using information technology to disable critical national infrastructure
CIA Triad
Confidentiality, integrity, and availability
reasonable assurance (in connection with IT security)
recognizes that managers must use their judgment to ensure that the cost of control does not exceed the system’s benefits or the risks involved.
key elements of the network security layer
Authentication methods, a firewall, routers, encryption, proxy servers, VPN, and an IDS
key elements of the application security layer
Authentication methods, user roles and accounts, and data encryption
key elements of the end-user security layer
Security education, authentication methods, antivirus software, and data encryption
What actions must be taken in the event of a successful security intrusion
The response plan should address notification, evidence protection, activity log maintenance, containment, eradication, and follow-up
blended threat
sophisticated threat that combines the features of a virus, worm, Trojan horse, and other malicious code into a single payload.
managed security service provider (MSSP)
company that monitors, manages, and maintains computer and network security for other organizations.