idk Flashcards

1
Q

malware designed to damage destroy or delay service to target systems

A

Deliberate software attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

types of deliberates software attacks

A

Viruses, worms, trojan horses, logic bombs, back/trap door, polymorphic threats, virus/worm hoaxes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Is depends on many interdependent support systems
Internet services, communications irregularities

A

Deviation in quality of service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Access of protected info by unauthorized individuals

A

Espionage/ trespass

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Expert hacker

A

Develops software scripts and program exploits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Most dangerous

A

Forces of nature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Individual lives, storage, transmission, use of information

A

Disrupts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Acts performed without malicious intent

A

Human error/ failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Steals information, demands compensation
Credit card

A

Information extortion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Can make organizations vulnerable to loss damage or disclosure of information assets

A

Missing inadequate or incomplete

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Website defacing can erode consumer confidence dropping sales organizations net worth

A

Sabotage or vandalism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

more sinister form of hacking

A

Cyberterrorism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Illegal taking of another’s physical, electronic or intellectual property

A

theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Occur when manufacturer distributes equipment containing flaws to users

A

Technical hardware failure or errors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

True or false: some errors are terminal; some are intermittent

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Purchased software that contains unrevealed faults

A

Technical software failures or errors

17
Q

Antiquated/outdated infrastructure can lead to unreliable untrustworthy systems

A

Technological obsolescence

18
Q

Execution of viruses, warns, ths
Intent to steal/destroy info

A

Malicious code

19
Q

Virus hoax with real virus attached
More devious form of attack

20
Q

Gaining access using known/previously unknown/ newly discovered access mechanisms

21
Q

Attempting to reverse calculate a password

A

Password crack

22
Q

Trying every possible combination

A

Brute force

23
Q

Most important

24
Q

Awareness

25
Q

Most difficult

26
Q

Educate

27
Q

Not static

A

Technology

28
Q

CIA triangle

A

Confidentiality, integrity, availability

29
Q

Systems administrators attempt to improve security of their systems

A

Grassroots effort

30
Q

Grassroots effort, technical expertise of indiv admins, lacks a number of critical features: participant support organizational staying power

A

Bottom - up approach

31
Q

Initiated by upper management and involve development strategy referred to as systems development life cycle

A

top-down approach

32
Q

intellectual property rights

A

patent trademark trade secret copyright