Unit 1

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which term is best described as a person or element that has the power to carry out a threat?

threat agent

Which law requires banks and financial institutions to alert customers of their policies and practices in disclosing customer information?

GLBA

Where are you most likely to find a PKES system?

an automobile

What does the FBI define as any "remediated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against non-combatant targets by sub-national groups or clandestine agents"?

cyberterrorism

In the past, which term was commonly used to refer to a person who uses advanced computer skills to attack computers?

hackers

Which of the following involves stealing another person's personal information, such as a social security number and then using the information to impersonate the victim, generally for financial gain?

identity theft

What term is frequently used to describe the tasks of securing information that is in a digital format?

information security

Security is ___ convenience.

inversely proportional to

Which phrase best descries security?

the goal to be free from danger as well as the process that achieves that freedom

Which of the following is a type of action that has the potential to cause harm?

threat

What is a flaw or weakness that allows a threat agent to bypass security?

vulnerability

From January 2005 through July 2015, approximately how many electronic data records in the United States were breached, exposing to attackers a range of personal electronic data, such as address, Social Security numbers, health records, and credit card numbers?

853 million

Which of the following ensures that data is accessible when needed to authorized users?

Availability

Which of the following is NOT a factor that contributes to difficulties faced in defending against attacks?

Enhanced encryption algorithms

Under which law must healthcare enterprises guard protected health information and implement policies and procedures to safeguard it, whether it be in paper or electronic format?

HIPPA

How do attackers today make it difficult to distinguish an attack from legitimate traffic?

by using common Internet protocols

Terrorist who turn their attacks to the network and computer infrastructure to cause panic among citizens are known as which of the following?

cyberterrorist

Which of the following ensures that information is correct and no unauthorized person or malicious software has altered it?

integrity

Information contained on devices is protected by three layers: Two of the layers are products and procedures. What is the third layer?

people

Which term is best described as individuals who want to attack computers yet who lack the knowledge of computers and networks needed to do so?

script kiddies


Conjuntos de estudio relacionados

OCE1001 FSU exam 1 (chapters 1,2,4)

View Set

Alteration in Mobility/Neuromuscular or Musculoskeletal Disorder Y ER GH VJIV

View Set

"NCLEX" - Type Nursing Process pt 1

View Set

Chapter 10 - How Ownership is Acquired & Conveyed

View Set