Module 5 Chp 5 Cybersecurity

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following statements refer to programs known as spiders, web crawlers, and bots?

- "Good bots" have diverse functions and do not pose security risks. - Internet robots are used for both legitimate and malicious purposes. - Malicious bots create security risks by compromising a user's control of the computer.

internal threats to cybersecurity

- An attack by an authorized user - The leakage of sensitive information - An accidental erasure of data

What confidential information does Social Engineering target?

- Bank Information - Passwords - Access to computers or networks - Social Security Numbers

How does cybersecurity help preserve the integrity of data, information, and systems?

- Cybersecurity tools such as user-access controls, file permission, and version controls help prevent unauthorized changes. - Cybersecurity systems are designed to detect unauthorized or unanticipated changes to data that suggest a loss of integrity. - Cybersecurity threat mitigation includes measures to protect the consistency, accuracy, and dependability of these assets.

How does cybersecurity help preserve the integrity of data, information, and systems?

- Cybersecurity tools such as user-access controls, file permission, and version controls help prevent unauthorized changes. - Cybersecurity threat mitigation includes measures to protect the consistency, accuracy, and dependability of these assets. - Cybersecurity systems are designed to detect unauthorized or unanticipated changes to data that suggest a loss of integrity.

Assets affected by cybersecurity threat

- Information - Software - Hardware

For a cybersecurity plan to succeed, which of the following must remain confidential?

- The organization's digital or computer systems - The logins and passwords of authorized users - Private or sensitive data and information

What are the 3 Main Components of Threat Mitigation?

- Threat Prevention - Threat Identification - Threat Cure

What are the 4 Common Types of Cybersecurity Breaches?

- Viruses - Spyware - Impersonation - Distributed Denial of Service (DDOS) Attack

The purpose of spyware is to ______

- capture the user's account data - passwords - key strokes - Other confidential information

Distributed Denial of Service (DDoS)

A cyberattack to make a computer or online service unavailable to its users. It's usually accomplished by flooding the resource with nonsensical or superfluous requests from multiple sources across the web.

Impersonation

A social engineering tool in which a hacker plays the role of someone the target knows or would likely trust, thereby fooling them into sharing important information.

Cybersecurity Exploit

A tool or technique for taking advantage of a cybersecurity vulnerability to break into a system and cause harm.

Types of Asset Loss

All forms of - intentional - unintentional - accidental - incidental - misuse - abuse - error - weakness - defect - fault - failure events

Database of Software Vulnerabilities

Attackers try to find vulnerabilities to exploit the issue to launch an attack. Because of this, many organizations maintain databases of software vulnerabilities (based on the software version) that are accessible to the public and help other organizations prevent against known vulnerabilities.

Threat Prevention

Policies and procedures put in place by an organization to protect systems and data

Threat Cure

Policies, tools, and strategies used to lessen the impact of active security threats

Threat Identification

Security tools and oversight designed to identify specific and active security threats

Spyware

Software that collects information about a person's Internet surfing habits and behaviors.

Cybersecurity Threat

an event or condition that has the potential for causing asset loss and the undesirable consequences or impact from such loss

Social Engineering Attacks

designed to get the individual to divulge sensitive information that can lead to security and data breaches

Cybersecurity breaches

early-stage intrusions that can lead to system damage, data loss, and network downtime.

Viruses

software that infects computers and is created using computer code

The need to keep sensitive data, information, and systems confidential _____

is both a major goal and a requirement for cybersecurity

Causes of Asset Loss

situations and events related to adversity related to adversity typically referred to as disruptions, hazards, or threats

Spyware

software that collects information about your Internet surfing habits and behaviors

Adware

software that collects the user's web browsing history.

Cybersecurity Threat Mitigation

the policies and procedures to help prevent against security incidents

Social Engineering

the unlawful manipulation of people in order to obtain and misuse their personal information

Cybersecurity Vulnerabilities

weaknesses or flaws in system security procedures, design, implementation, and control that could be compromised accidentally or intentionally

The information collected by spyware includes:

• keystrokes • passwords • account numbers • other confidential information

System Compromises can result:

• security breaches • lost information or data • system outages • violations of an organization's system security policy • vulnerabilities also occur as a result of security exposure in an operating system or application software


Ensembles d'études connexes

Publications Semester 1 finals study guide

View Set

30 Questions to Test a Data Scientist on Tree Based Models

View Set

Ch. 27: WHMIS Part 2 - Labeling of Controlled Products

View Set

Фармакологія тести

View Set

Chapter 4 Loops and Files (reading)

View Set

Tversky and Kahneman- Availability heuristic

View Set

Pituitary Disorder NCLEX Questions

View Set

CHAPTER 2 (Business Pressures, Organizational Responses, and IT Support)

View Set