IAS chap 2 Flashcards

1
Q

Items of fact collected by an organization.
raw numbers, facts, and words

A

Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

practice of protecting digital information from unauthorized access, corruption, or theft throughout its entire lifecycle.

A

Data security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

an intentional or unintentional act that can damage or otherwise compromise information and the systems that support it.

A

Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

an object, person, or other entity that represents a constant danger to an asset

A

Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

the ownership of ideas and control over the tangible or virtual representation of those ideas

A

Intellectual property (IP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

most common IP breach

It is an unauthorized duplication, installation, or distribution of computer software

A

Software Piracy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

uses unethical means to collection and analyze the information about an organization’s business competitors

A

Industrial espionage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

– protect equipment against spikes, surges and blackouts for a limited period

A

Uninterruptible power supply (UPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A document that specifies the expected level of service from a service provider

A

Service Level Agreement (SLA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

an electronic and human activities that can breach the confidentiality of information

A

Espionage or Trespass

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

analysis of information of other company thru a legal techniques

A

Competitive intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

one of the greatest threat in an organization asset

A

Employee

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

is a broad range of malicious activities accomplished through psychological manipulation of people

A

Social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

relies on the curiosity or greed of the victim

A

Baiting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

looking over someone’s shoulder to get information

A

Shoulder Surfing / Pretexting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

click on links to malicious websites
mainly conducted through emails and phone calls

13
Q

more targeted version of phishing, send a customize message to their target (high officials)

A

Spear Fishing

13
Q

mainly conducted through emails and phone calls

14
Q

victim is deceived to think their system is infected to installing fake antivirus

15
Q

involve injecting malware that encrypts a victim’s critical data

A

Ransomware

16
Q

help attacker to gain unauthorized access into an organization physical facilities

A

Tailgating

17
Q

attacker retrieved discarded information thrown in trash

A

Dumpster Diving

18
Q

an attack that denies access and offer fee to the victim to return their access

A

Ransomware

19
Q

computer software specifically designed to perform malicious or unwanted actions.

20
Q

A type of malware that is capable of activation and replication without being attached to
an existing program.

21
Q

is a computer program that attaches itself to an executable file or application.

22
Q

A malware program that hides its true nature and reveals its designed behavior only
when activated.

A

Trojan Horses

23
Q

changing its size and other external file characteristics to elude detection by antivirus software
programs.

A

Polymorphic Threats

24
Q

time and money are spent resolving virus hoaxes.

A

Virus and Worm Hoaxes -

25
Q

A malware payload that provides access to a system by bypassing normal access
controls.

A

Back Doors

26
Q

an attack that attempts to overwhelm a computer target’s ability to handle incoming communications, prohibiting legitimate users from accessing those systems.

A

DoS (Denial of Service)

27
Q

Spam is unsolicited commercial e-mail

A

Email Attacks

28
Q

attack designed to overwhelm the receiver with excessive quantities of e-mail

29
Q

technique for gaining unauthorized access to computers using a forged or modified source IP address to give the perception that messages are coming from a trusted host.

30
Q

The redirection of legitimate user Web traffic to illegitimate Web sites with the intent to collect personal information.

31
Q

A group of attacks whereby a person intercepts a communications stream and insert himself in the conversation to convince each of the legitimate parties that he is the other communications partner.

A

Man-in-the-Middle -