Chapter 10 Flashcards
sources of threats
human error
computer crime
natural disaster
types of security loss
unauthorized data disclosure incorrect data modification faulty service denial of service loss of infrastructure
unauthorized data disclosure
when a threat obtains data that is supposed to be protected
pretexting
when someone deceives by pretending to be someone else
phishing
used for obtaining unauthorized data by using pretexting through email
spoofing
same as pretexing
IP spoofing
an intruder uses another site’s IP address as a disguise
sniffing
intercepting computer communications
wardrivers
take computers with wireless connections through an area and search for unprotected networks
faulty service
problems that result from incorrect system operations
usurpation
when computer criminals invade a computer system and replace legitimate programs with their own
unauthorized data disclosure (example)
if a professor were to release students names and grades to the public, which is illegal
incorrect data modification (example)
if an employee incorrectly increases a sales discount for a customer
an employee’s salary is incorrectly modified
faulty service (example)
if a person incorrectly preforms a task like putting the wrong box of cereal on the shelf
if a system developer were to incorrectly write programs
denial of service (example)
if a person inadvertently shuts down a Web server