Module 2 - The Need for INFOSEC Flashcards

1
Q

What is the #1 rated threat from internal sources?

A

Inability/unwillingness to follow established policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is CAPEC?

A

A tool that security professionals can use to understand attacks hosted by MITRE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the 12 categories of threats?

A
  1. Deviations in quality of service
  2. Espionage or trespass
  3. Forces of nature
  4. Human error or failure
  5. Information extortion
  6. Sabotage or vandalism
  7. Software attacks
  8. Technical hardware failures or errors
  9. Technical software failures or errors
  10. Technological obsolescence
  11. Theft
  12. Compromises to intellectual property
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Piracy, copyright infringement

A

Compromises to intellectual property

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Internet service provider (ISP), power, or WAN service problems

A

Deviations in quality of service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Unauthorized access and/or data collection

A

Espionage or trespass

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Fire, floods, earthquakes, lightning

A

Forces of nature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Accidents, employee mistakes

A

Human error or failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Blackmail, information disclosure

A

Information extortion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Destruction of systems or information

A

Sabotage or vandalism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Viruses, worms, macros, denial of service

A

Software attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Equipment failure

A

Technical hardware failures or errors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Bugs, code problems, unknown loopholes

A

Technical software failures or errors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Antiquated or outdated technologies

A

Technological obsolescence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Illegal confiscation of equipment or information

A

Theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Intellectual property (IP):

A

creation, ownership, and control of original ideas as well as the representation of those ideas

17
Q

IP includes (4):

A
  1. Trade secrets
  2. Copyrights
  3. Trademarks
  4. Patents
18
Q

The most common IP breaches involve:

A

software piracy

19
Q

Which two watchdog organizations investigate software abuse?

A
  1. Software and Information Industry Association (SIIA)
  2. Business Software Alliance (BSA)‏
20
Q

A short-term decrease in electrical power availability is known as a _____.

A

sag

21
Q

an increase in power availability

A

spike (or swell) or a surge

22
Q

Uses social skills to convince people to reveal access credentials or other valuable information to an attacker.

A

Social engineering

23
Q

What is Cyberextortion?

A

Attacker steals information from a computer system and demands compensation for its return or nondisclosure

24
Q

Used to overwhelm the processing capabilities of online systems or to gain access to protected systems via hidden means.

A

Malicious software (malware)

25
Q

It attacks a browser’s address bar to redirect users to an illegitimate site for the purpose of obtaining private information.

A

Pharming

26
Q

Communications interception attacks include (4):

A
  1. Sniffers
  2. Spoofing
  3. Pharming
  4. Man-in-the-Middle
27
Q

Measure hardware failure rates.

A
  1. Mean time between failure
  2. Annualized failure rates
28
Q

Dedicated to helping organizations create/operate trustworthy software and publishes a list of top security risks

A

Open Web Application Security Project (OWASP)

29
Q

Information security performs four important functions to ensure that information assets remain safe and useful:

A
  1. Protecting the organization’s ability to function
  2. Enabling the safe operation of applications implemented on the organization’s IT systems
  3. protecting the data an organization collects and uses
  4. Safeguarding the organization’s technology assets.
30
Q

Consider this statement:
“When security needs and business needs collide, business needs win out.”

Do you think there are times and circumstances when this is not completely true? When might that be?

If you are working in the area of information security, what does this statement indicate about how you should work with other units in the organization?

A