ITSAC - Module 2 Flashcards

1
Q

4 FUNCTIONS OF INFO SECURITY IN ORG

A
  • Protecting the ability to function
  • Enabling safe operation
  • Protecting data
  • Safeguarding technology assets
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  • object, person, or either entity that represents a consant danger to an asset
A

threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

includes acts done without malicious content
caused by inexperience, improper training, and incorrect assumptions
other circumtances - Employees are the greatest threats — closest to org’s data

A

acts of human error or failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  • broad category
  • unauthorized accessing of info
  • competitive advantage vs espionage
  • shoulder surfing can occur any place a person is accessing confidential info
  • Controls implemented to mark the boundaries of an organization’s virtual territory giving notice to trespassers that they are encroaching on the organization’s cyberspace​
  • Hackers uses skill, guile, or fraud to steal the property of someone else​
A

espionage/trespass

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Espionage vs. Tresspass

A

Espionage - getting other’s recipe (illegal)
Tresspass - buying other’s product and determining what ingredients are needed (legal)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  • an attacker or formerly trusted insider stealing information from a computer system and demands compensation for its return or non-use
  • extortion found in credit card number theft
A

Information Extortion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  • indiv or group wo want to sabotage/destroy the operation
  • petty vandalism to organized sabotage
  • orgs rely on image so web defacing can lead to droppiung consumer
  • higher threat of hactivist or cyberactivist operations
  • most extreme of cyber-terrorism
A

sabotage or vandalism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

illegal taking another’s property — physical, electronic, intellectual

A

Deliberate acts of Theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Physical, electronic & intellectual theft

A
  • Physical Theft: Stealing tangible objects (e.g., money, jewelry, or cars). locked doors/alarm system
  • Electronic Theft: Unauthorized access or hacking to steal digital assets (e.g., credit card info, passwords). more complex problem, org may not know it has occured
  • Intellectual Theft: Stealing ideas, inventions, or creative works (e.g., plagiarism, patent infringement).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  • these are unexpected and can occuer with very little warning
  • can disrupt not only lives of indiv, but also the storage, transmission and use of info
  • management —- prepare contigency plans and limit damage
A

Forces of Nature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  • occur when a manifacturer distributes to user’s equipment containing flaws
  • can cause the system to perform outside of expected parameters (unreliable, lack of available)
    *
A

Technical Hardware Failures or Errors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Terminal vs Intermittent Error

A

A terminal error is a critical issue that stops a system or process completely. unrecoverable loss of equipment

An intermittent error occurs occasionally and does not permanently disrupt the system. faults not easily repeated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

attack system, creates malware

A

Software Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  • harmful software designed to damage, disrupt, or steal data from computers or networks. malicious code/software
  • designed to damage, destroy, or denyservice to the target systems
A

malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

spread with user interaction (needs host)

A

virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

spread automatically (no host)

17
Q

disguised as legitimate software

18
Q

hides deep within PC

19
Q

monitors your activity

20
Q

multiple malware in one attack

A

blended threat

21
Q

controls your PC form a distance

A

remote access

22
Q

maliciously feeds you ads

23
Q

hunts software vulnerabilities (not expert but can steal info using this)

A

exploit kit

24
Q

tool to exploit info
* is a type of malicious software that blocks access to a computer system or encrypts data until a sum of money is paid

A

ransomware

25
Q

rekords key stroke

26
Q

denial of service

A

pc/s —> server

27
Q

Protect yourself from keylogger

A
  • enable two-factor authentication
  • don’t download unknown files
  • consider a virtual keyboard
  • use a password manager
  • install antivirus software
  • consider voice-to-text conversion software
28
Q

is software that detects, prevents, and removes malware from computers and devices.