CIS133 - Chapter 1 Quiz

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

From January 2005 through July 2012, over ____ electronic data records in the United States were breached, exposing to attackers a range of personal electronic data, such as address, Social Security numbers, health records, and credit card numbers.

562 million

____ ensures that data is accessible when needed to authorized users.

Availability

"____" involves breaking into a car's electronic system.

Car hacking

In a well-run information security program, attacks will never get through security perimeters and local defenses.

False

There is a straightforward and easy solution to securing computers.

False

In the last year, over 600,000 Apple Macs were infected with a malicious software called ____.

Flashback

____ requires banks and financial institutions to alert customers of their policies and practices in disclosing customer information.

GLBA

Under____, healthcare enterprises must guard protected health information and implement policies and procedures to safeguard it, whether it be in paper or electronic format.

HIPAA

____ involves stealing another person's personal information, such as a Social Security number, and then using the information to impersonate the victim, generally for financial gain.

Identity theft

____ ensures that information is correct and no unauthorized person or malicious software has altered that data.

Integrity

____ are individuals who want to attack computers yet they lack the knowledge of computers and networks needed to do so.

Script kiddies

Attack tools can initiate new attacks without any human participation, thus increasing the speed at which systems are attacked.

True

Financial cybercrime is often divided into two categories. The first category focuses on individuals and businesses.

True

Today, many attack tools are freely available and do not require any technical knowledge to use.

True

The FBI defines ____ as any "premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against non-combatant targets by sub-national groups or clandestine agents."

cyberterrorism

Terrorists who turn their attacks to the network and computer infrastructure to cause panic among citizens are known as ____.

cyberterrorists

In the past, the term ____ was commonly used to refer to a person who uses advanced computer skills to attack computers.

hacker

The term ____ is frequently used to describe the tasks of securing information that is in a digital format.

information security

Security ____ convenience.

is inversely proportional to

Information (contained on the devices) is protected by three layers: products, ____, and policies and procedures.

people

Attackers today use common Internet ____ and applications to perform attacks, making it difficult to distinguish an attack from legitimate traffic.

protocols

A computer ____ is a person who has been hired to break into a computer and steal information.

spy

On average it takes ____ days for a victim to recover from an attack.

ten

A(n) ____ is a type of action that has the potential to cause harm.

threat

A(n) ____ is a person or element that has the power to carry out a threat.

threat agent

A(n) ____ is a flaw or weakness that allows a threat agent to bypass security.

vulnerability


Kaugnay na mga set ng pag-aaral

Curzon, partition of Bengal, Morley Minto Ref

View Set