SEC +

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

What are the four different risk response techniques?

Accept, transfer, avoid, and mitigate ody>

Why are there delays in updating products such as anti-virus software to resist attacks?

At the current rate of submissions of potential malware on a daily basis, updates for anti-virus software would need to be released every few seconds.

Describe the security principle of simplicity

Because attacks can come from a variety of sources and in many ways, information security is by its very nature complex. The more complex something becomes, the more difficult it is to understand. In addition, complex systems allow many opportunities for something to go wrong. Complex security systems can be hard to understand, troubleshoot, and feel secure about. As much as possible, a secure system should be simple for those on the inside to understand and use. Complex security schemes are often compromised to make them easier for trusted users to work with, yet this can also make it easier for the attackers. In short, keeping a system simple from the inside but complex on the outside can sometimes be difficult but reaps a significant benefit.

What threat actors are generally believed to be the most dangerous threat actors? Explain your answer. body>

Many security researchers believe that nation state actors might be the deadliest of any threat actors. Nation state actors target very specific resources and the attackers keep working until they are successful. State sponsored attackers are highly skilled and have enough government resources to breach almost any security defense

. Information security is achieved through a combination of what three entities? Provide at least one example of each entity

Products (physical security): The physical security around the data. May be as basic as door locks or as complicated as intrusion-detection systems and firewalls. People (personnel security): Those who implement and properly use security products to protect data. Procedures (organizational security): Plans and policies established by an organization to ensure that people correctly use the products.

. What are script kiddies?

Script kiddies are individuals who want to break into computers to create damage yet lack the advanced knowledge of computers and networks needed to do so. Instead, script kiddies do their work by downloading automated attack software (scripts) from Web sites and using it to perform malicious acts.

What is the Payment Card Industry Data Security Standard (PCI DSS)?

The PCI DSS is a set of security standards that all companies that process, store, or transmit credit or debit card information must follow. PCI applies to any enterprise or merchant, regardless of its size or number of card transactions, that processes transactions either online or in person

List and describe three of the characteristics of information that must be protected by information security >

Three of the characteristics of information that must be protected by information security are: 1. Confidentiality-Confidentiality ensures that only authorized parties can view the information. 2. Integrity-Integrity ensures that the information is correct and no unauthorized person or malicious software has altered that data. 3. Availability-Availability ensures that data is accessible to authorized users.

What is occurring when an attacker manipulates commonplace actions that are routinely performed in a business? >

Vulnerable business processes, also called business process compromise (BPC), occurs when an attacker manipulates commonplace actions that are routinely performed within an organization. oB<|

Why is the speed of malicious attacks making the challenge of keeping computers secure more difficult?

With modern tools at their disposal, attackers can quickly scan systems to find weaknesses and launch attacks with unprecedented speed. Many tools can even initiate new attacks without any human participation, thus increasing the speed at which systems are attacked.


Kaugnay na mga set ng pag-aaral

Change and Power, Policy, and Politics

View Set

Chapter Seven Homework - Microeconomics

View Set

Chapter 14: Intrapartum Fetal Surveillance

View Set

Term 1 vocabulary 4 (Identidades)

View Set

entrepreneurial finance Exam 1 Chapters 1-5

View Set