Chapter 1 Flashcards

1
Q

On average it takes ____ days for a victim to recover from an attack.

A

Ten

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

involves breaking into a car’s electronic system.

A

Car Hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

From January 2005 through July 2012, over ____ electronic data records in the United States were breached, exposing to attackers a range of personal electronic data, such as address, Social Security numbers, health records, and credit card numbers.

A

562 million

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Attackers today use common Internet ____ and applications to perform attacks, making it difficult to distinguish an attack from legitimate traffic.

A

protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The term ____ is frequently used to describe the tasks of securing information that is in a digital format.

A

information security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

___ ensures that information is correct and no unauthorized person or malicious software has altered that data.

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

____ ensures that data is accessible when needed to authorized users.

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Information (contained on the devices) is protected by three layers: products, ____, and policies and procedures.

A

people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A(n) ____ is a type of action that has the potential to cause harm.

A

threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A(n) ____ is a person or element that has the power to carry out a threat.

A

threat agent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A(n) ____ is a flaw or weakness that allows a threat agent to bypass security

A

vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Under____, healthcare enterprises must guard protected health information and implement policies and procedures to safeguard it, whether it be in paper or electronic format.

A

HIPAA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

___ requires banks and financial institutions to alert customers of their policies and practices in disclosing customer information.

A

GLBA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The FBI defines ____ as any “premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against non-combatant targets by sub-national groups or clandestine agents.”

A

cyberterrorism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In the past, the term ____ was commonly used to refer to a person who uses advanced computer skills to attack computers.

A

hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

are individuals who want to attack computers yet they lack the knowledge of computers and networks needed to do so.

A

Script kiddies

17
Q

A computer ____ is a person who has been hired to break into a computer and steal information.

A

Spy

18
Q

Terrorists who turn their attacks to the network and computer infrastructure to cause panic among citizens are known as ____.

A

cyberterrorists

19
Q

Due to overwhelmed vendors trying to keep pace by updating their products against attacks

A

Delays in security updating

20
Q

Potentially the next target for attackers

A

Personal Medical Devices

21
Q

Made possible by new software tools and techniques

A

Faster Detection of Vulnerabilities

22
Q

Results in attackers that can launch attacks against millions of computers within minutes

A

Speed of attacks

23
Q

Results in attack tools that can vary their behavior so the same attack appears differently each time

A

greater sophistication of attacks

24
Q

Results in attacks that are no longer limited to highly skilled attackers

A

Simplicity of attacks

25
Q

Allows attackers from anywhere in the world can send attacks

A

Universally Connect

26
Q

Happens when attackers use thousands of computers in an attack against a single computer or network

A

Distributed Attacks

27
Q

Happens when users are required to make difficult security decisions with little or no instruction

A

User Confusion