chapter 1 intro to security Flashcards
attacker who would break into a computer system without the owners permission and publicly disclose the vulnerabilities?
gray hat
why can brokers command such a high price for what they sell?
the vulneralbility was perviously unknown and is unlikely to be patched quickly.
which phrase describes the term “security” in a general sense?
necessary steps to protect a person or property from harm.
——— ensures that only authorized parties can view the information?
confidentiality.
a person that has the power to carry out a threat?
threat agent
——– ensures that individuals are who they claim to be.
authentication
what is the difference between a activist and a cyberterrorist?
hactivist is not to incite panic like cyberterrorist.
which act requires enterprises to guard protected health information and implement policies and procedures to safeguard it?
health insurance portability and accountability act (HIPAA)
why do cyberterrorist target power plants, air traffic control centers, and water systems?
they can cause significant disruption by destroying a few targets.
first step of a cyber kill chain
reconnaissance
an organization the purchased security products from different vendors is demonstrating which security principle?
diversity
what are attackers called who belong to a network of identity thieves and financial fraudsters?
cybercriminals
what is an objective of state-sponsored attackers?
to spy on citizens
an example of——— is not revealing the type of computer, operating system, software, and network connection a computer uses.
obscurity
the ——— is primarily responsible for assessing, managing, and implementing security.
chief information security officer (CISO)