CH 5 Flashcards
Define spoofing.
An attempt to gain access to a network by posing as an authorized user in order to find sensitive information, such as passwords or credit card information.
What is the CIA triangle?
The three important aspects of computer and network security: confidentiality, integrity and availability.
What are 3 examples of intentional computer and network threats?
- Viruses
- Worms
- Trojan horse
Define a Denial-of-Service (DoS) attack.
DoS floods a network or server with service requests to prevent legitimate users’ access to the system.
What are 3 recommendations in order to guard against social engineering threats?
- Be careful with unsolicited emails and do not click on attachments
- Be careful of requests for confidential information
- Be cautious about requests that require prompt action
What are 5 examples of biometric devices and measures?
- Facial recognition (only one that you do not have to opt-in)
- Fingerprints
- Iris analysis
- Palm prints
- Retinal scanning
What are 5 recommendations for establishing a comprehensive security system?
- Set up a security committee with representatives from all departments as well as upper management.
- Post the security policy in a visible place, or post copies next to all workstations.
- Use physical security measures, such as corner bolts on workstations, ID badges and door locks.
- Raise employees’ awareness of security problems.
- Keep sensitive data, software, and printouts locked in secure locations.
What is business continuity planning?
Outlines procedures for keeping an organization operational in the event of a natural disaster or network attack.