chap1 Flashcards

1
Q

Great businesses have been created by __________ and __________ the power of data and data analytics

A

Collecting and Harnessing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This group of criminals breaks into computers or networks to gain access for various reasons.

A

Hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Break into networks or computer systems to discover weaknesses in order to improve the security of these systems.

A

White hat hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Somewhere between white and black hat attackers. These attackers may find a vulnerability and report it to the owners of the system if that action coincides with their agenda.

A

Gray hat hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Are unethical criminals who violate computer and network security for personal gain, or for malicious reasons, such as attacking networks.

A

Black hat hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Teenagers or hobbyists mostly limited to pranks and vandalism, have little or no skill, often using existing tools or instructions found on the Internet to launch attacks.

A

Script Kiddies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Grey hat hackers who attempt to discover exploits and report them to vendors, sometimes for prizes or rewards.

A

Vulnerability Brokers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Grey hat hackers who rally and protest against different political and social ideas. They publicly protest against organizations or governments by posting articles, videos, leaking sensitive information, and performing distributed denial of service (DDoS) attacks.

A

Hacktivists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

These are black hat hackers who are either self-employed or working for large cybercrime organizations. Each year, they are responsible for stealing billions of dollars from consumers and businesses.

A

Cyber Criminals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Depending on a person’s perspective, these are either white hat or black hat hackers who steal government secrets, gather intelligence, and sabotage networks. Their targets are foreign governments, terrorist groups, and corporations. Most countries in the world participate to some degree in state-sponsored hacking.

A

State Sponsored Hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The Nation Common Vulnerabilities and Exposures (CVE) database is an example of the development of a national database. The CVE National Database was developed to provide a publicly available database of all know vulnerabilities.

A

Vulnerability Database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The Honeynet project is an example this system. The project provides a HoneyMap which displays real-time visualization of attacks.

A

Early Warning Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

InfraGard is an example of widespread sharing of cyber intelligence. The InfraGard program is a partnership between the and the private sector. The participants are dedicated to sharing information and intelligence to prevent hostile cyberattacks.

A

Share Cyber Intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The ISO 27000 standards are an example of Information Security Management Standards. The standards provide a framework for implementing cybersecurity measures within an organization.

A

ISM Standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The ISACA group track law enacted related to cyber security. These laws can address individual privacy to protection of intellectual property. Examples of these laws include Cybersecurity Act, Federal Exchange Data Breach Notification Act and the Data Accountability and Trust Act.

A

New Laws

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Is the possibility that a harmful event, such as an attack, will occur.

A

Cybersecurity threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Is a weakness that makes a target susceptible to an attack.

A

Cyber vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Criminals use __________ tools to capture data streams over a network. Works by monitoring and recording all information coming across a network.

A

Packet-sniffing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Criminals can also use __________, such as unsecured Wi-Fi access points.

A

Rogue devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Interferes with an established network communication by constructing packets to appear as if they are part of a communication.

A

Packet forgery (or packet injection)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

On a __________ level, everyone needs to safeguard his or her identity, data, and computing devices.

A

Personal level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

At the __________ level, it is the employees’ responsibility to protect the organization’s reputation, data, and customers.

A

Corporate level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

At the __________ level, national security and the citizens’ safety and well-being are at stake.

A

State level

24
Q

In the U.S., the __________ is responsible for intelligence collection and surveillance activities.

A

National Security Agency (NSA)

25
Q

Have the potential to cause greater damage than external threats because internal users have direct access to the building and its infrastructure devices.

A

Internal threats

26
Q

An __________ , such as an employee or contract partner, can accidently or intentionally spread threats

A

Internal user

27
Q

From amateurs or skilled attackers can exploit vulnerabilities in networked devices, or can use social engineering, such as trickery, to gain access.

A

External threats

28
Q

BYOD stands for.

A

Bring Your Own Device

29
Q

Is the result of data sets that are large and complex, making traditional data processing applications inadequate.

A

Big data

30
Q

Big data poses both challenges and opportunities based on three dimensions:

A

Volume or amount of data, velocity or speed of data, variety or range of data types and sources.

31
Q

Is a continuous computer hack that occurs under the radar against a specific object. Criminals usually use this for business or political motives.

A

Advanced persistent threat (APT)

32
Q

Can track system self-reporting data, like how much energy a computer is using, and use that information to select targets or trigger false alerts.

A

Algorithm attacks

33
Q

Algorithmic attacks are more __________ because they exploit designs used to improve energy savings, decrease system failures, and improve efficiencies.

A

Devious

34
Q

Refers to multiple enterprises that let their users use the same identification credentials gaining access to the networks of all enterprises in the group.

A

Federated identity management

35
Q

The goal of __________ is to share identity information automatically across castle boundaries.

A

Federated identity management

36
Q

The most common way to protect federated identity is to__________ to an authorized device.

A

tie login ability

37
Q

Uses phone calls against a target telephone network tying up the system and preventing legitimate calls from getting through.

A

Telephone denial of service (TDoS) attack

38
Q

The next generation 911 call centres are vulnerable because they use __________ systems rather than traditional landlines.

A

Voice-over-IP (VoIP) systems

39
Q

Created a framework for companies and organizations in need of cybersecurity professionals.

A

National Institute of Standards and Technologies (NIST)

40
Q

Includes the identification, analysis, and mitigation of threats to internal systems and networks.

A

Protect and Defend

41
Q

Includes the investigation of cyber events and/or cybercrimes involving IT resources.

A

Investigate

42
Q

Includes specialized denial and deception operations and the collection of cybersecurity information

A

Collect and Operate

43
Q

Includes highly specialized review and evaluation of incoming cybersecurity information to determine if it is useful for intelligence

A

Analyze

44
Q

Provides for leadership, management, and direction to conduct cybersecurity work effectively

A

Oversight and Development

45
Q

Includes conceptualizing, designing, and building secure IT systems

A

Securely Provision

46
Q

CompTIA-sponsored testing program that certifies the competency of IT administrators in information assurance.

A

CompTIA Security+ (SY0-701)

47
Q

Is an intermediate-level certification asserts that cybersecurity specialists holding this credential possess the skills and knowledge for various hacking practices.

A

EC-Council Certified Ethical Hacker (CEH)

48
Q

A good choice for an entry-level credential for cybersecurity specialists who can demonstrate that they understand security terminology and concepts and have the skills and expertise required for “hands-on” security roles.

A

SANS GIAC Security Essentials (GSEC)

49
Q

Is a vendor-neutral certification for those cybersecurity specialists with a great deal of technical and managerial experience.

A

(ISC)² Certified Information Systems Security Professional (CISSP)

50
Q

Cybersecurity specialists responsible for managing, developing and overseeing information security systems at the enterprise level or for those developing best security practices can qualify for CISM.

A

ISACA Certified Information Security Manager (CISM)

51
Q

Validates that a cybersecurity specialist has the knowledge and skills required to secure Cisco networks.

A

Cisco Certified Network Associate Security (CCNA Security)

52
Q

These certifications measure knowledge and competency in installing, configuring, and maintaining vendor products.

A

Company Sponsored Certifications

53
Q

SANS stands for.

A

SysAdmin, Audit, Network, and Security

54
Q

IISSCC stands for.

A

International Information Systems Security Certification Consortium

55
Q

MS-ISAC stands for.

A

Multi-State Information Sharing and Analysis Center

56
Q

FIRST stands for.

A

Forum of Incident Response and Security Teams

57
Q

INFOSYSSEC stands for.

A

Information Systems Security