Chapter 10 Flashcards

0
Q

CERT

A

Computer emergency response team

Formed at Carnegie Mellon university with DoD support

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

Security of information assets

A

Protected with encryption passwords certifications and coding

Laws are slow to catch up with cyber crime

Now a federal crime but with light sentences

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why networks need security

A

Vulnerable due to dependency on internet access for computers and networks

Average 350,000 loss per incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cost of internet protection

A

value of data and application far exceeds the cost of networks

Firms spend about 1250/ employee on network security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Primary security goals CIA

A

Confidentiality- protection of data from unauthorized disclosure
Integrity- assurance that data has not been altered
Availability- providing continuous operations of hardware and software for uninterrupted service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Disruptions

A

Loss of network service

Minor or temporary - like a circuit failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Destruction of data

A

Viruses destroying files, crash of hard disk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Natural disasters

A

Can destroy host computers or sections of networks

Effects 20 percent of organizations each year

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Intrusion

A

Hackers gain access to data files
Most incidents involve employees

Will be charged with industrial spying or fraud
Average 100,000 dollars per incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Preventative controls

A

Mitigate or stop a person from action or an event from occurring

Discouraging or restraining act as a deterrent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Detective controls

A

Reveal or discover unwanted events through auditing

Document events for potential evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Corrective controls

A

Remedy an unwanted event or a trespass

Reinitiating a network circuit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly