ch12 Flashcards

1
Q

what is the name of safeguards that involve vulnerabilities in hardware and software

A

technical safeguards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is the name of where you put your digital encryption keys

A

key escrow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what are three sources of security threats

A

Malicious human activity
Human errors and mistakes
. Natural events and disasters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Pretexting

A

pretending to be someone else on the phone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Phishing

A

trying to be someone your not on a email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Spear Phishing

A

more personalized phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Spoofing

A

pretending to be someones elses IP and email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Sniffing

A

intercepting computer communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Ransomware

A

making files unusable and then asking for money to give it back

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what does PCI stand for

A

payment card Industry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what are the 7 since for security

A
  1. Not measuring network security
  2. Thinking compliance equals security
  3. Overlooking people such as employees
  4. Too much access for too many (and all access for
    one!)
  5. Lax patching procedures
  6. Lax logging and monitoring
  7. Spurning the KISS principle (KISS: Keep It Simple
    for Security)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what are three safeguards

A

technical safeguards, data safeguards, human safeguards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is PIPEDA

A

its the Personal Information Protection and Electronic Documents Act and it gives people the right to know why a organization gets there info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Biometric authentication

A

finger print or face ID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

types of Malware

A

Viruses, worms, spyware, and adware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is spyware

A

its a program put on a users device without there concent and it monitors there activity

17
Q

what is hardening

A

its taking steps in reducing the systems vulnerability and is a technical safeguard

18
Q

what is a cold site

A

its office space and computers for a organization to use if they are hacked the slowest of the three

19
Q

what is a hot site

A

its centers that are ready with equipment that companies might need if they loss there main assets the fastest of the three

20
Q

what is a warm site

A

its a center that has some equipment and is a mix or both hot and cold so its in the middle of the three