Mis 3

¡Supera tus tareas y exámenes ahora con Quizwiz!

gray hat hackers

A cross between black and white—they will often illegally break into systems merely to flaunt their expertise to the administrator of the system they penetrated or to attempt to sell their services in repairing security breaches.

encryption

Scrambling data using a code or formula, known as a cipher, such that it is hidden from those who do not have the unlocking key.

Attacks that exhaust all possible password combinations in order to break into an account are called _____ attacks.

brute-force

disruptive innovation

challenge incumbent businesses create and new market and value network 1. performance attributes and not valued by existing customers 2. performance attributes invade established markets

black hat hackers

criminals who exploit a system's weakness for personal or financial gain

An attack on the US power grid by terrorists or a foreign power is indicative of:

cyberwarfare

Almost all security breaches can be traced back to technology lapses; personnel or procedural factors rarely factor in.

false

Because of Moore's Law, widely-used encryption programs currently employed by banks and ecommerce sites are now easily penetrated by brute-force attacks that can be employed by hackers using just a handful of simple desktop computers

false

a black hat hacker looks for the weaknesses in security mechanisms, with a view to help plug the holes that might be exploited by cyber-criminals.

false

Sustaining innovation

improve existing products that customers are eager to buy, higher profit margins

which of the following is a valid statement on information security?

information security is everyone's responsibility

security breach

is a security incident in which data is viewed, copied, altered, deleted by an unauthorized individual

which of the following statements hold true for encryption?

it refers to scrambling data using a code or formula, known as a cipher, such that it is hidden from those who do not have the unlocking key

which of the following statements is consistent with ground realities regarding information security?

law-enforcement agencies struggle to hire, train, and retain staff capable of keeping pace with today's cyber-criminals

which is the following aspects of international law would enable a cyber-criminal operating across the borders to evade prosecution?

non-existent extradition agreements between two countries

which of these would be an example of a DDoS attack?

overloading a popular social networking site with inbound messages in order to shut down access to the site

Updates that plug existing holes in a software are called:

patches

which of the following types of infiltration techniques does one open up to by posting sensitive personal information and details about one's workplace on social networking sites?

social engineering

white hat hackers

work at the request of the system owners to find system vulnerabilities and plug the holes

brute-force attack

Every possible key is tried

innovation

a new idea, method, or product

which of the following are considered sources of information that can potentially be used by social engineers?

all of the above

information security policies would be ineffective without __ and ___.

audit; enforcement

Technologies that measure and analyze human body characteristics for identification or authentication are known as _____.

biometrics

Hordes of surreptitiously infiltrated computers, linked and controlled remotely, are known as zombie networks or:

botnets

a(n) ___ is someone who uncovers computer weaknesses and reveals them to manufacturers or system owners; without exploiting these vulernabilities

white hat hacker

hacker

someone who uses their knowledge to break down and bypass security measures on a computer, device, or network

Some of the most common guidelines issued by Web sites when designing a secure password include:

the password should be at least eight characters long and include at least one number and other non alphabet character

social eng

tricking people into revealing sensitive information

computer systems are often infected with malware by means of exploits that sneak in masquerading as something they are not. these exploits are called

trojans

dumpster diving refers to physically trawling through trash to mine any valuable data or insights that can be stolen or used in a security attack

true

phis

type of social engineering, fake email with link to get your information

cyberwarfare

using technology to disrupt the activities of a state or organization


Conjuntos de estudio relacionados

Chap 8 Pelvic Girdle and Lower Limb

View Set

CIPP/E Part II: European Data Protection Law and Regulation

View Set

Musculoskeletal & Superficial Structures

View Set

Real Estate Fundamental lessons 5-9

View Set