Chapter 4 Flashcards

1
Q

Social engineering

A

an attack in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Unintentional Threats to Information Systems

A

Human errors
social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Espionage or tresspass

A

when an unauthorized individual attempts to gain illegal access to organizational information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Information extortion

A

online crime where hackers hold your personal data until you meet their demands

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Sabotage or vandalism

A

deliberate acts to attempt to damage the organizations image

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Compromises to intellectual property

A

unauthorized use, duplication, distribution of protected IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Software attacks

A

computer code and applications that can damage your computer or steal sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Malware (malicious software)

A

viruses and worms
spread by downloads and emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Virus vs worm

A

viruses require active host program

worms are already infected and active operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Alien software

A

Adware (ads that can be a threat)

Spyware (cookies give access to information about user)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Physical controls (protecting information resources)

A

Prevent unauthorized individuals from gaining access to a company’s facilities

walls, doors, fences

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Access controls

A

logical controls (implemented by software) help to provide controls such as authentication, authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Applications Controls

A

input, processing, output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Disaster recovery plan

A

hot site (all components)
warm site (most components)
cold site (secondary location)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Business Continuity Planning (BCP)

A

provide continuous availability
be able to recover in the event of a hardware or software failure of attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
A