Chapter 1 Flashcards
On average it takes ____ days for a victim to recover from an attack.
Ten
involves breaking into a car’s electronic system.
Car Hacking
From January 2005 through July 2012, over ____ electronic data records in the United States were breached, exposing to attackers a range of personal electronic data, such as address, Social Security numbers, health records, and credit card numbers.
562 million
Attackers today use common Internet ____ and applications to perform attacks, making it difficult to distinguish an attack from legitimate traffic.
protocols
The term ____ is frequently used to describe the tasks of securing information that is in a digital format.
information security
___ ensures that information is correct and no unauthorized person or malicious software has altered that data.
Integrity
____ ensures that data is accessible when needed to authorized users.
Availability
Information (contained on the devices) is protected by three layers: products, ____, and policies and procedures.
people
A(n) ____ is a type of action that has the potential to cause harm.
threat
A(n) ____ is a person or element that has the power to carry out a threat.
threat agent
A(n) ____ is a flaw or weakness that allows a threat agent to bypass security
vulnerability
Under____, healthcare enterprises must guard protected health information and implement policies and procedures to safeguard it, whether it be in paper or electronic format.
HIPAA
___ requires banks and financial institutions to alert customers of their policies and practices in disclosing customer information.
GLBA
The FBI defines ____ as any “premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against non-combatant targets by sub-national groups or clandestine agents.”
cyberterrorism
In the past, the term ____ was commonly used to refer to a person who uses advanced computer skills to attack computers.
hacker