Threats Flashcards

1
Q

Accidental Threats

A

User Error
Power loss
Hardware/Software malfunction
Hardware loss
Lack of security or knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Deliberate Threats

A

Malware
Phishing
Hacking
Denial of Service attacks (DoS)
Thief

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Event based

A

These are a threat to data and information that is a result of a natural
event.
* This includes fires, flood, heatwaves, storms and earthquakes
* Power Surges are considered one type of event based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Security Controls

A

a measure designed to protect data and information form threats,
either accidental, deliberate or event based.

Security controls on their own, do not guarantee that the data and
information will be fully protected .Rather they reduce the chances of unauthorised access and/or data
loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Software Security Controls

A
  • Usernames and passwords
  • Access Logs
  • Audit trails
  • Access restrictions
  • Encryption
  • Firewalls
  • System protection
  • Security protocols
  • Two Factor authentication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Physical Security Controls

A

Zoned security strategies
Barrier techniques
Biometrics
Uninterrupted Power Supply (UPS)

Physical Procedures
Backups
Shedding Documents
Checking Authorisation credentials
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Common signs of intrusion

A

Increease resource use
New Software
Changed passwords
Spam email
Unknown Applications
Uninstalled system protection
A device completeing tasks by itself
Changes to web browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Other issues to consider

A

Out of date software
Digital Signature
Ethical Hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Consequences for security failure

A

Loss of customer loyalty
Oenalities and prosecution
Loss of trade secrets
Decline in stock price
Loss of productivity
Inability to pay staff
Loss of income
Disruption to data and equipment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Evaluating information management strategies

A

These criteria need to correlate with the functional and non
functional requirements for a solution – the reasons for is
development and design, as well as its ease of use.
E.g. use of logs, interviews or questionnaires

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Effectiveness of strategies

A

Data integrity
Security
Ease of Reteval
Currency of files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly