Part 9 Flashcards

0
Q

There are several reasons it is difficult to defend against today’s attacks. These reasons include the fact that virtually all devices are connected to the _____, the speed of the ____, greater sophistication of attacks, the availability and ____ of attack tools, faster detection of ____ by attackers, delays in ____, weak patch distribution, distributed attacks coming from multiple sources, and user ____.

A
Internet
attacks
simplicity
vulnerabilities
patching
confusion
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

No computer system is ____ or can be considered entirely secure.

A

immune from attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Information security may be defined as that which protects the ( 3 items) of information on the devices that store, manipulate, and transmit the information through (3 items)

A

integrity, confidentiality, and availability

products, people, and procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A ___ is an event or action that represents a danger to information assets, which is something that has value.

A

threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A ____ is a person or element that has the power to carry out a threat, usually by exploiting a vulnerability, which is a flaw or weakness.

A

threat agent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A ___ is the likelihood that a threat agent will exploit the vulnerability.

A

risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The main goals of ___ are to prevent data theft, thwart identify theft, avoid the legal consequences of not securing information, maintain productivity, and foil cyberterrorism.

A

information security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

____ do their work by downloading automated attack software from Web sites and then using it to break into computers.

A

Script kiddies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A ____ is a person who has been hired to break into a computer and steal information.

A

computer spy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

One of the largest information security threats to a business actually comes from its ____.

A

employees

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A new breed of computer attackers is known as ____, who are a loose-knit network of attackers, identity thieves, and financial fraudsters.

A

cybercriminals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

____ are motivated by their principles and beliefs, and turn their attacks to the network and computer infrastructure to cause panic among citizens.

A

Cyberterrorists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

There are a variety of types of attacks. Five general steps make up an attack:

A

probe for information, penetrate any defenses, modify security settings, circulate to other systems, and paralyze networks and devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Although multiple defenses may be necessary to withstand the steps of an attack, these defenses should be based on five fundamental security principles:

A

layering, limiting, diversity, obscurity, and simplicity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The ability that provides tracking of events.

A

accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An item that has value.

A

asset

16
Q

The act of ensuring that an individual or element is genuine.

A

authorization

17
Q

The steps that ensure that the individual is who they claim to be.

A

authentication

18
Q

Security actions that ensure that data is accessible to authorized users.

A

availability

19
Q

Security actions that ensure only authorized parties can view the information.

A

confidentiality

20
Q

Targeted attacks against financial networks, unauthorized access to information, and the theft of personal information.

A

cybercrime

21
Q

A premeditated, politically motivated attack against information, computer
systems, computer programs, and data that results in violence.

A

cyberterrorism

22
Q

The act of taking advantage of a vulnerability.

A

exploiting

23
Q

A law that requires banks and financial institutions to

alert customers of their policies and practices in disclosing customer information.

A

Gramm-Leach-Bliley Act (GLBA)

24
Q

A law designed to guard protected health information and implement policies and procedures to safeguard it.

A

Health Insurance Portability and Accountability Act (HIPAA)

25
Q

Stealing another person’s personal information, such as a Social Security
number, and then using the information to impersonate the victim, generally for financial gain.

A

identity theft

26
Q

The tasks of securing information that is in a digital format.

A

information security

27
Q

Security actions that ensure that the information is correct and no unauthorized person or malicious software has altered the data.

A

integrity

28
Q

The likelihood that a threat agent will exploit the vulnerability.

A

risk

29
Q

A law designed to fight corporate corruption.

A

Sarbanes-Oxley Act (Sarbox)

30
Q

Individuals who want to break into computers to create damage, yet lack the advanced knowledge of computers and networks needed to do so.

A

script kiddies

31
Q

A person who has been hired to break into a computer and steal information

A

spy

32
Q

A type of action that has the potential to cause harm.

A

threat

33
Q

A person or element that has the power to carry out a threat.

A

threat agent

34
Q

A flaw or weakness that allows a threat agent to bypass security.

A

vulnerability