IST 205 QUIZ 4

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

_________ is an attack in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company information such as passwords.

Social engineering

A(n) _________ to an information resource is any danger to which a system may be exposed.

threat

An information resource's _________ is the possibility that the system will be harmed by a threat.

vulnerability

A password system on a computer network is an example of which type of information security control?

Access

_________ is also called digital extortion.

Ransomware

Implementing controls to prevent threats from occurring and developing a recovery plan should the threats occur are two broad functions of:

Risk mitigation

The US intelligence community accused _________ of the hacks on the Democratic National Committee in 2015 and 2016.

Russia

If a hacker takes control of equipment such as power grids or nuclear power plants, this is an example of a(n) _________ attack.

SCADA

Hackers used _________ to get into the Democratic National Committee computer systems.

spear-phishing


Ensembles d'études connexes

Chapter 18: European Power and Expansion

View Set

Chapter 10: Corporate Level Strategy: Related and Unrelated Diversification

View Set

This is Sum Physics stuff you should use to get GigaBrain In physics

View Set

I271 Networking Essentials Cards

View Set