IAS - THE NEED FOR SECURITY Flashcards

Lesson 3

1
Q

BUSINESS NEEDS FIRST

  1. Protecting the organization’s ability to function.
    2.Enabling the safe operation of applications running on the organization’s IT systems
  2. Protecting the data the organization collects and uses
  3. Safeguarding the organization’s technology assets
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Both general management and IT management are responsible for implementing information security

A
  1. Protecting the functionality of an Organization
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Organizations are under immense pressure to acquire and operate integrated, efficient, and capable applications.

A
  1. Enabling the safe operation of applications running on the organization’s IT systems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Without data, an organization loses its record of transactions and/or its ability to deliver value to its customers.

A
  1. Protecting the data the organization collects and uses
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Organization must employ secure infrastructure services appropriate to the size and scope of the enterprise.

A
  1. Safeguarding the organization’s technology assets
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Is an object, person, or other entity that presents an ongoing danger to an asset.

A

Threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

It occurs when an individual or group designs and deploys software to attack a system.

Most of these software is referred to as _______

A

Deliberate Software Attacks - Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

-Malicious Software
-Any program or file that is harmful to a computer user.

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A malicious program designed to replicate itself and transfer from one computer to another.

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

It is a dangerous computer program that replicates itself through a network

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A malicious program disguises as a useful program but, once downloaded or installed, leaves your PC unprotected and allows hackers to get your information.

A

Trojan Horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A virus worm can have a payload that installs trap door component in a system, which allows the system at will with special privileges.

A

Back Door

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

One that over time changes the way it appears to antivirus software programs, making it undetectable by techniques that look for preconfigured signatures.

A

Polymorphic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

force majeure, can present some of the most dangerous threats, because they usually occur with very little warning and are beyond the control of people.

A

Forces of Nature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

FORCES OF NATURE

  • EARTHQUAKE
  • FLOOD
  • TSUNAMI
  • TYPHOON
  • TORNADO
  • FIRE
  • LANDSLIDE
  • LIGHTNING
  • ELECTROSTATIC DISCHARGE
  • DUST
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An attack is an act that takes advantage of a vulnerability to a compromise a controlled system.

A

Attack

17
Q

Is an identified weakness in a controlled system, where controls are not present or are no longer effective.

A

Vulnerability

18
Q

The application of computing and network resources to try every possible password combination.

A

Brute Force

19
Q

An attempt to reverse-calculate a password.

A

Crack

20
Q

A variation of the brute force attack which narrows the filed by selecting specific target accounts and using a list of commonly used password instead of random combinations.

A

Dictionary

21
Q

The attacker sends a large number of connection or information requests to a target.

A

Denial of Service (DOS)

22
Q

An attack in which a coordinated stream of requests is launched against a target from many locations at the same time.

A

Distributed Denial of Service (DDOS)

23
Q

A technique used to gain unauthorized access to computers, wherein the intruder sends messages with a source IP address that has been forged to indicate that the messages are coming from a trusted host.

A

Spoofing

24
Q

TCP Hijacking attack, an attacker monitors packets from a network, modifiers them, and inserts them back into the network.

A

Man in the Middle

25
Q

An attacker routes large quantities of e-mail to the target.

A

Mail Bombing

26
Q

The process of using skills to convince people to reveal access credentials or other valuable information to the attacker.

A

Social Engineering

27
Q

An attempt to gain personal or financial information from an individual, usually by posing as a legitimate entity.

A

Phishing

28
Q

The redirection of legitimate web traffic to an illegitimate site for the purpose of obtaining private information.

A

Pharming