InfoSec Review 1&2

¡Supera tus tareas y exámenes ahora con Quizwiz!

true

. True or False: Cyberterrorism has thus far been largely limited to acts such as the defacement of NATO Web pages during the war in Kosovo.

methodology

A formal approach to solving a problem based on a structured sequence of procedures is called a(n) _____.

champion

A senior executive who promotes an information security project and ensures its support, both financially and administratively, at the highest levels of the organization is called a(n) _____.

vulnerability

A(n) attack is an act that exploits a(n) ______.

man-in-the-middle

Another name for TCP hijacking is _____.

Management and Technology

Information security has more to do with _____ than with _____

possession

Ownership or control of information is called the characteristic of _____

confidentiality

The characteristic of information that deals with preventing disclosure is

false; computer virus

True or False: A computer worm consists of segments of code that perform malicious actions.

true

True or False: If information has a state of being genuine or original and is not a fabrication, it has the characteristic of authenticity.

true

True or False: Information security programs that begin at a grassroots level by system administrators to improve security are often called a bottom-up approach.

true

True or False: Many organizations find that their most valuable asset is their data.

True

True or False: Personal security addresses the issues needed to protect items, objects, or areas.

true

True or False: The person responsible for the storage, maintenance, and protection of the information is the data custodian.

true

True or False: Warnings of attacks that are not valid are usually called hoaxes.

false; cracking

True or False: When a program tries to reverse-calculate passwords, this is known as a brute force spoof.

False; Art and Science

True or False: With the level of complexity in today's information systems, the implementation of information security has often been described as a combination of art and technology

spam

Unsolicited commercial e-mail is also called _____.

back door

Using a known or previously installed access mechanism is called using a _____.

organizational management and professionals

What are the three most commonly encountered communities of interest that have roles and responsibilities in information security

dictionary attack

When a program tries using all commonly used passwords, this is known as a(n) ______.

top-down

When projects are initiated at the highest levels of an organization and then pushed to all levels, they are said to follow a(n) ____ approach.

maintenance and change

Which SecSDLC phase keeps the security systems in a high state of readiness?

script kiddies

____ are hackers of limited skill who use expertly written software to attack a system

social science

____ examines the behavior of individuals as they interact with systems, whether societal systems or information systems.

cyberterrorists

____ hack systems to conduct terrorist activities via network or Internet pathways

pharming

____ is "the redirection of legitimate Web traffic to an illegitimate site for the purpose of obtaining private information."

information extortion

____ occurs when an attacker or trusted insider steals information from a computer system and demands compensation for its return or for an agreement not to disclose it.

personal

____ security addresses the protection of individuals or groups authorized to access an organization.

communications

____ security encompasses the protection of an organization's communications media, technology, and content.

theft

______ is the illegal taking of another's property, which can be physical, electronic, or intellectual.


Conjuntos de estudio relacionados

External Parasites Lice and Ticks

View Set

What was the name and where was the location of the capital and cultural center of the Byzantine Empire?

View Set

Chapter 32: stress and coping 1128

View Set

Art Appreciation Midterm Study (Chapters 1 - 15)

View Set