Part 9 Flashcards
There are several reasons it is difficult to defend against today’s attacks. These reasons include the fact that virtually all devices are connected to the _____, the speed of the ____, greater sophistication of attacks, the availability and ____ of attack tools, faster detection of ____ by attackers, delays in ____, weak patch distribution, distributed attacks coming from multiple sources, and user ____.
Internet attacks simplicity vulnerabilities patching confusion
No computer system is ____ or can be considered entirely secure.
immune from attacks
Information security may be defined as that which protects the ( 3 items) of information on the devices that store, manipulate, and transmit the information through (3 items)
integrity, confidentiality, and availability
products, people, and procedures.
A ___ is an event or action that represents a danger to information assets, which is something that has value.
threat
A ____ is a person or element that has the power to carry out a threat, usually by exploiting a vulnerability, which is a flaw or weakness.
threat agent
A ___ is the likelihood that a threat agent will exploit the vulnerability.
risk
The main goals of ___ are to prevent data theft, thwart identify theft, avoid the legal consequences of not securing information, maintain productivity, and foil cyberterrorism.
information security
____ do their work by downloading automated attack software from Web sites and then using it to break into computers.
Script kiddies
A ____ is a person who has been hired to break into a computer and steal information.
computer spy
One of the largest information security threats to a business actually comes from its ____.
employees
A new breed of computer attackers is known as ____, who are a loose-knit network of attackers, identity thieves, and financial fraudsters.
cybercriminals
____ are motivated by their principles and beliefs, and turn their attacks to the network and computer infrastructure to cause panic among citizens.
Cyberterrorists
There are a variety of types of attacks. Five general steps make up an attack:
probe for information, penetrate any defenses, modify security settings, circulate to other systems, and paralyze networks and devices.
Although multiple defenses may be necessary to withstand the steps of an attack, these defenses should be based on five fundamental security principles:
layering, limiting, diversity, obscurity, and simplicity.
The ability that provides tracking of events.
accounting