Lab Simulation 1-1: Understanding the Various Attack Types
Why would system software not be considered a critical asset?
-It can be recovered from a system partition -It can be purchased -It is easily replaced
Which of the choices provided ensures that information is accessible only to authorized users?
Availability
Attacks no longer limited to highly skilled attackers.
Availability and simplicity of attack tools
Which of the choices provided ensures that only approved individuals can access special content?
Confidentiality
Select the critical asset in the choices provided.
Customized business software
Vendors are overwhelmed trying to keep pace updating their products against the latest attacks.
Delays security updating
Attackers use thousands of computers in an attack against a single computer or network.
Distributed attacks
Attack tools vary their behavior so the same attack appears differently each time.
Greater sophistication of attacks
Attackers can launch attacks against millions of computers within minutes.
Increased speed of attacks
Which of the choices is NOT part of the CIA model?
Information
Which of the choices provided would be considered a critical asset?
Information
Which of the choices provided ensures that information is correct and has not been altered?
Integrity
Those who implements and properly use security products to protect data.
People
Plans and policies established by an organization to ensure that people correctly use the products.
Policies and Procedures
Form the security around the data. May be as basic as door locks or as complicated as network security equipment.
Products
Attackers from anywhere in the world can send attacks.
Universally connected devices
Users are required to make difficult security decisions with little or no instruction.
User confusion
Many software products lack a means to distribute security updates in a timely fashion.
Weak security update distribution
