Chapter 1 Flashcards
On average it takes ____ days for a victim to recover from an attack.
Ten
involves breaking into a car’s electronic system.
Car Hacking
From January 2005 through July 2012, over ____ electronic data records in the United States were breached, exposing to attackers a range of personal electronic data, such as address, Social Security numbers, health records, and credit card numbers.
562 million
Attackers today use common Internet ____ and applications to perform attacks, making it difficult to distinguish an attack from legitimate traffic.
protocols
The term ____ is frequently used to describe the tasks of securing information that is in a digital format.
information security
___ ensures that information is correct and no unauthorized person or malicious software has altered that data.
Integrity
____ ensures that data is accessible when needed to authorized users.
Availability
Information (contained on the devices) is protected by three layers: products, ____, and policies and procedures.
people
A(n) ____ is a type of action that has the potential to cause harm.
threat
A(n) ____ is a person or element that has the power to carry out a threat.
threat agent
A(n) ____ is a flaw or weakness that allows a threat agent to bypass security
vulnerability
Under____, healthcare enterprises must guard protected health information and implement policies and procedures to safeguard it, whether it be in paper or electronic format.
HIPAA
___ requires banks and financial institutions to alert customers of their policies and practices in disclosing customer information.
GLBA
The FBI defines ____ as any “premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against non-combatant targets by sub-national groups or clandestine agents.”
cyberterrorism
In the past, the term ____ was commonly used to refer to a person who uses advanced computer skills to attack computers.
hacker
are individuals who want to attack computers yet they lack the knowledge of computers and networks needed to do so.
Script kiddies
A computer ____ is a person who has been hired to break into a computer and steal information.
Spy
Terrorists who turn their attacks to the network and computer infrastructure to cause panic among citizens are known as ____.
cyberterrorists
Due to overwhelmed vendors trying to keep pace by updating their products against attacks
Delays in security updating
Potentially the next target for attackers
Personal Medical Devices
Made possible by new software tools and techniques
Faster Detection of Vulnerabilities
Results in attackers that can launch attacks against millions of computers within minutes
Speed of attacks
Results in attack tools that can vary their behavior so the same attack appears differently each time
greater sophistication of attacks
Results in attacks that are no longer limited to highly skilled attackers
Simplicity of attacks
Allows attackers from anywhere in the world can send attacks
Universally Connect
Happens when attackers use thousands of computers in an attack against a single computer or network
Distributed Attacks
Happens when users are required to make difficult security decisions with little or no instruction
User Confusion