IST 205 QUIZ 4

¡Supera tus tareas y exámenes ahora con Quizwiz!

_________ is an attack in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company information such as passwords.

Social engineering

A(n) _________ to an information resource is any danger to which a system may be exposed.

threat

An information resource's _________ is the possibility that the system will be harmed by a threat.

vulnerability

A password system on a computer network is an example of which type of information security control?

Access

_________ is also called digital extortion.

Ransomware

Implementing controls to prevent threats from occurring and developing a recovery plan should the threats occur are two broad functions of:

Risk mitigation

The US intelligence community accused _________ of the hacks on the Democratic National Committee in 2015 and 2016.

Russia

If a hacker takes control of equipment such as power grids or nuclear power plants, this is an example of a(n) _________ attack.

SCADA

Hackers used _________ to get into the Democratic National Committee computer systems.

spear-phishing


Conjuntos de estudio relacionados

Chapter 18: European Power and Expansion

View Set

Chapter 10: Corporate Level Strategy: Related and Unrelated Diversification

View Set

This is Sum Physics stuff you should use to get GigaBrain In physics

View Set

Motor Learning, Chapter 11 Objectives

View Set

I271 Networking Essentials Cards

View Set