Module 2 - The Need for INFOSEC Flashcards
What is the #1 rated threat from internal sources?
Inability/unwillingness to follow established policy
What is CAPEC?
A tool that security professionals can use to understand attacks hosted by MITRE
What are the 12 categories of threats?
- Deviations in quality of service
- Espionage or trespass
- Forces of nature
- Human error or failure
- Information extortion
- Sabotage or vandalism
- Software attacks
- Technical hardware failures or errors
- Technical software failures or errors
- Technological obsolescence
- Theft
- Compromises to intellectual property
Piracy, copyright infringement
Compromises to intellectual property
Internet service provider (ISP), power, or WAN service problems
Deviations in quality of service
Unauthorized access and/or data collection
Espionage or trespass
Fire, floods, earthquakes, lightning
Forces of nature
Accidents, employee mistakes
Human error or failure
Blackmail, information disclosure
Information extortion
Destruction of systems or information
Sabotage or vandalism
Viruses, worms, macros, denial of service
Software attacks
Equipment failure
Technical hardware failures or errors
Bugs, code problems, unknown loopholes
Technical software failures or errors
Antiquated or outdated technologies
Technological obsolescence
Illegal confiscation of equipment or information
Theft
Intellectual property (IP):
creation, ownership, and control of original ideas as well as the representation of those ideas
IP includes (4):
- Trade secrets
- Copyrights
- Trademarks
- Patents
The most common IP breaches involve:
software piracy
Which two watchdog organizations investigate software abuse?
- Software and Information Industry Association (SIIA)
- Business Software Alliance (BSA)
A short-term decrease in electrical power availability is known as a _____.
sag
an increase in power availability
spike (or swell) or a surge
Uses social skills to convince people to reveal access credentials or other valuable information to an attacker.
Social engineering
What is Cyberextortion?
Attacker steals information from a computer system and demands compensation for its return or nondisclosure
Used to overwhelm the processing capabilities of online systems or to gain access to protected systems via hidden means.
Malicious software (malware)