Part 4 Flashcards

0
Q

Businesses must understand that any network that is connected to the Internet is a ____, regardless of the type of business

A

potential target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

Beware of ____

A

Common Misconceptions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Attackers will attempt to ____ and its systems for several reasons.

A

gain access to a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The first is to look around to see what they can find. Regardless of the type of business, ____ will more than likely be stored on one of the systems. This includes Social Security numbers and other ____. This type of information is a target—always.

A

personnel information

personal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Another possibility is that the attacker will ____ the information he or she finds or simply ____ the systems to behave abnormally.

A

modify,reconfigure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This type of attacker is not interested in financial gain; he is simply the technology version of teenagers who soap windows, egg cars, and cover property with toilet paper. He attacks because he finds it _____ to do so.

A

entertaining

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Additionally, these attackers could use the systems to ____ stolen “property” such as child pornography or credit-card numbers.

A

store

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

If a system is not secure, attackers can ____ these types of materials on your system and ____ to them at their leisure.

A

store, gain access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The final possibility is that an attacker will use the hacked systems to ____ on other unprotected networks and systems.

A

mount attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Computers can be used to mount ____, relay spam, or spread malicious software.

A

denial-of-service (DoS) attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

To put it simply, _____

A

no computer or network is immune from attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Another common misconception is that an organi- zation is immune from problems caused by ____, essentially saying, “We trust all our ___, so we don’t have to focus our energies on protecting our assets from them.”

A

employees

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Though this is common for small businesses in which the owners know everyone, it also occurs in larger organizations where companies believe that they only hire “____.

A

professionals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

It is important to remember that no matter how well job candidates present them- selves, a business can never know everything about an employee’s past. For this reason it is important for busi- nesses to conduct _____ of all employees. Furthermore, it is important to conduct these _____ properly and completely.

A

preemployment background checks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

However, peo-ple’s lives and fortunes can change during the ____.

A

course of employment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

____ can cause otherwise law-abiding citizens to take risks they never would have thought possible.

A

Financial pressures

16
Q

____ can alter people’s behavior as well.

A

Drug and alcohol dependency

17
Q

It is important to recognize that although an individual might be very knowledgeable and technologically sophisticated, ____

A

no one knows everything about computers.

18
Q

Because ____ does not understand technology, they are not in a very good position to judge a person’s depth of knowledge and experience in the field.

A

management

19
Q

When it comes to security we must keep in mind that it is a ____, and implementing a strong security posture requires significant ____

A

specialized area, training and experience.