Test 2 Flashcards
T O F:
It is impossible for organizations to provide perfect security
True
Define Security
can be defined as the degree of protection against criminal activity, danger, damage, or loss.
Define Information Security
all of the processes and policies designed to protect an organization’s information and information systems (IS) from unauthorized access, use, disclosure, disruption, modification, or destruction
Define a Threat to an information resource
A threat to an information resource is any danger to which a system may be exposed.
Define the Exposure of an information resource
The exposure of an information resource is the harm, loss, or damage that can result if a threat compromises that resource
Define an information resource’s vulunerability
An information resource’s vulnerability is the possibility that a threat will harm that resource.
What are the 5 Key Facts contributing to the increasing vulnerability of organizational information resources
1.Today’s interconnected, interdependent, wirelessly networked business environment
2.Smaller, faster, cheaper computers and storage devices
3.Decreasing skills necessary to be a computer hacker
4.International organized crime taking over cybercrime
5.Lack of management support
What are the 2 major categories of threats in information security?
The 2 major categories of threats are unintentional threats and deliberate threats.
Unintentional threats are acts performed without malicious intent
Define Social Engineerings
An attack in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company information, such as passwords
Types of Social Engineering
Phone Calls- why weren’t u in court?
Physical- hey I’m with IT
Tailgating- following in 320 lol
Soulder Surfing- watch you put password on phone
What are Fishing Attacks?
Phishing Attacks: use deception to acquire sensitive personal information by masquerading as official-looking e-mails, instant messages or te
What are the types of fishing attacks
Spear Phishing Attacks: personalized phishing attacks that target specific individuals or organizations
Whaling Attacks: spear phishing towards high-value individuals to steal sensitive info from companies (usually targeting executives and HR departments)
What are deliberate cyber threats?
Theft of Equipment or Information
What are some examples of deliberate threats
Identity Theft
Compromises to Intellectual Property
Software Attacks
Ransomware
Doxxing
Bots/Denial of Service
What is Malware
MALICIOUS software designed to wreak havoc
Define Ransomware
Blocks access to an individual computer or an organization’s computer system/network