Network Security CH. 1

¡Supera tus tareas y exámenes ahora con Quizwiz!

List and describe three of the characteristics of information that must be protected by information security?

1. Confidentiality-Confidentiality ensures that only authorized parties can view the information. 2. Integrity-Integrity ensures that the information is correct and no unauthorized person or malicious software has altered that data. 3. Availability-Availability ensures that data is accessible to authorized users.

What are the four different risk response techniques?

Accept, transfer, avoid, and mitigate.

What class of attacks use innovative attack tools and once a system is infected it silently extracts data over an extended period?

Advanced Persistent Threat

Which of the following ensures that data is accessible to authorized users?

Availability

Which of the following are considered threat actors? (Choose all that apply.)

Brokers and Competitors

Which of the three protections ensures that only authorized parties can view information?

Confidentiality

What term best describes any premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against noncombatant targets by subnational groups or clandestine agents?

Cyberterrorism

What term describes a layered security approach that provides the comprehensive protection?

Defense-In-Depth

In what kind of attack can attackers make use of millions of computers under their control in an attack against a single server or network?

Distributed

Which of the following is a valid fundamental security principle? (Choose all that apply.)

Diversity, Simplicity and Layering

As security is increased, convenience is often increased.

False

Brokers steal new product research or a list of current customers to gain a competitive advantage.

False

Successful attacks are usually not from software that is poorly designed and has architecture/design weaknesses.

False

Which law requires banks and financial institutions to alert customers of their policies and practices in disclosing customer information?

Gramm-Leach-Bliley

Under which laws are health care enterprises required to guard protected health information and implement policies and procedures whether it be in paper or electronic format?

HIPAA

What term is used to describe a group that is strongly motivated by ideology, but is usually not considered to be well-defined and well-organized?

Hacktivists

Which of the following is a common security framework? (Choose all that apply.)

ISO, COBIT and RFC

What type of theft involves stealing another person's personal information, such as a Social Security number, and then using the information to impersonate the victim, generally for financial gain?

Identity Theft

Which term below is frequently used to describe the tasks of securing information that is in a digital format?

Information Security

Select the information protection item that ensures that information is correct and that no unauthorized person or malicious software has altered that data.

Integrity

What type of diversity is being implemented if a company is using multiple security products from different manufacturers?

Manufacturer Diversity

What term is used to describe state-sponsored attackers that are used for launching computer attacks against their foes?

Nation State Actors

Select the term that best describes automated attack software?

Open-Source-Intelligence

Information security is achieved through a combination of what three entities? Provide at least one example of each entity.

Products (physical security): The physical security around the data. May be as basic as door locks or as complicated as intrusion-detection systems and firewalls. People (personnel security): Those who implement and properly use security products to protect data. Procedures (organizational security): Plans and policies established by an organization to ensure that people correctly use the products.

Which term is used to describe individuals who want to attack computers yet lack the knowledge of computers and networks needed to do so?

Script Kiddies

What term refers to an action that provides an immediate solution to a problem by cutting through the complexity that surrounds it?

Silver Bullet

What process describes using technology as a basis for controlling the access and usage of sensitive data?

Technical controls

What is the Payment Card Industry Data Security Standard (PCI DSS)?

The PCI DSS is a set of security standards that all companies that process, store, or transmit credit or debit card information must follow. PCI applies to any enterprise or merchant, regardless of its size or number of card transactions, that processes transactions either online or in person.

A vulnerability is a flaw or weakness that allows a threat to bypass security.

True

To mitigate risk is the attempt to address risk by making the risk less serious.

True

What is occurring when an attacker manipulates commonplace actions that are routinely performed in a business?

Vulnerable business processes, also called business process compromise (BPC), occurs when an attacker manipulates commonplace actions that are routinely performed within an organization.

Why is the speed of malicious attacks making the challenge of keeping computers secure more difficult?

With modern tools at their disposal, attackers can quickly scan systems to find weaknesses and launch attacks with unprecedented speed. Many tools can even initiate new attacks without any human participation, thus increasing the speed at which systems are attacked.

In information security, what can constitute a loss?

all of the above a force of nature such as a tornado that could destroy computer equipment a virus that attacks a computer network a person attempting to break into a secure computer network

In information security, which of the following is an example of a threat actor?

all of the above theft of information a delay in transmitting information that results in a financial penalty the loss of good will or a reputation


Conjuntos de estudio relacionados

Abeka 7th Grade: Of People Reading Quiz M

View Set

Business Mathematics Chapter 7 - Discounts: Trade and Cash

View Set