Mid-Term Flashcards
“4-1-9” fraud is an example of a __________ attack
social engineering
“4-1-9” is one form of a(n) __________ fraud.
advance-fee
A __________ is an attack in which a coordinated stream of requests is launched against a target from many locations at the same time.
Distributed Denial of service
A hacker who intentionally removes or bypasses software copyright protection designed to prevent unauthorized duplication or use is known as a(n) __________.
Cracker
A model of InfoSec that offers a comprehensive view of security for data while being stored, processed, or transmitted is the __________ security model
CNSS
A potential weakness in an asset or its defensive control system(s) is known as a(n) __________.
vulnerability.
process that defines what the user is permitted to do is known as __________.
Authorization.
A short-term interruption in electrical power availability is known as a __________.
Fault
A technique used to compromise a system is known as a(n) __________
exploit
Acts of __________ can lead to unauthorized real or virtual actions that enable information gatherers to enter premises or systems they have not been authorized to access.
Trepass
An attack that uses phishing techniques along with specialized forms of malware to encrypt the victim’s data files is known as__________.
ransomware
An information security professional with authorization to attempt to gain system access in an effort to identify and recommend resolutions for vulnerabilities in those systems is known as a(n) __________.
penetration tester.
An intentional or unintentional act that can damage or otherwise compromise information and the systems that support it is known as a(n) __________.
Attack
Any event or circumstance that has the potential to adversely affect operations and assets is known as a(n) __________
Threat
As frustrating as viruses and worms are, perhaps more time and money is spent on resolving virus __________.
hoaxes
Human error or failure often can be prevented with training and awareness programs, policy, and __________ .
controls
In the __________ attack, an attacker monitors (or sniffs) packets from the network, modifies them, and inserts them back into the network.
man-in-the-middle
One form of online vandalism is __________, in which individuals interfere with or disrupt systems to protest the operations, policies, or actions of an organization or government agency.
hacktivist
Technology services are usually arranged with an agreement defining minimum service levels known as a(n) __________.
SLA
The hash values for a wide variety of passwords can be stored in a database known as a(n) __________, which can be indexed and quickly searched using the hash value, allowing the corresponding plaintext password to be determined.
rainbow table
The protection of confidentiality, integrity, and availability of data regardless of its location is known as _______ security.
Information
The protection of voice and data components, connections, and content is known as _______ security.
network
The unauthorized duplication, installation, or distribution of copyrighted computer software, which is a violation of intellectual property, is called _______
software piracy.
The use of cryptographic certificates to establish Secure Sockets Layer (SSL) connections is an example of which process?
authentication.
What do audit logs that track user activity on an information system provide?
accountability
___________is the set of responsibilities and practices exercised by the board and executive management with the goal of providing strategic direction, ensuring that objectives are achieved, ascertaining that risks are managed appropriately, and verifying that the enterprise’s resources are used responsibly.
Governance
__________ are malware programs that hide their true nature and reveal their designed behavior only when activated.
Trojan horses
__________ is the collection and analysis of information about an organization’s business competitors, often through illegal or unethical means, to gain an unfair edge over them.
Industrial espionage
Individuals who control, and are therefore responsible for, the security and use of a particular set of information are known as ____________
Data Owners.
The individual responsible for the assessment, management, and implementation of information-protection activities in the organization is known as a(n) ____________.
Chief of Information Security.
A 2007 Deloitte report found that enterprise risk management is a valuable approach that can better align security functions with the __________ while offering opportunities to lower costs.
enterprise risk management
A clearly directed __________ flows from top to bottom, and a systematic approach is required to translate it into a program that can inform and lead all members of the organization.
strategy
A formal approach to solving a problem based on a structured sequence of procedures, the use of which ensures a rigorous process and increases the likelihood of achieving the desired final objective, is known as a(n) ____________.
Methodology
A high-level executive such as a CIO or VP-IT, who will provide political support and influence for a specific project, is known as a(n) _________.
champion
A person or organization that has a vested interest in a particular aspect of the planning or operation of an organization—for example, the information assets used in a particular organization—is known as a(n) _________.
stakeholder
A project manager who understands project management, personnel management, and InfoSec technical requirements is needed to fill the role of a(n) ____________.
Team Leader.