IST 205 QUIZ 4
_________ is an attack in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company information such as passwords.
Social engineering
A(n) _________ to an information resource is any danger to which a system may be exposed.
threat
An information resource's _________ is the possibility that the system will be harmed by a threat.
vulnerability
A password system on a computer network is an example of which type of information security control?
Access
_________ is also called digital extortion.
Ransomware
Implementing controls to prevent threats from occurring and developing a recovery plan should the threats occur are two broad functions of:
Risk mitigation
The US intelligence community accused _________ of the hacks on the Democratic National Committee in 2015 and 2016.
Russia
If a hacker takes control of equipment such as power grids or nuclear power plants, this is an example of a(n) _________ attack.
SCADA
Hackers used _________ to get into the Democratic National Committee computer systems.
spear-phishing