暗記メーカー
ログイン
INFO. ASSURANCE &SECURITY
  • Jamaica Rose Gilo

  • 問題数 100 • 11/23/2024

    記憶度

    完璧

    15

    覚えた

    35

    うろ覚え

    0

    苦手

    0

    未解答

    0

    アカウント登録して、解答結果を保存しよう

    問題一覧

  • 1

    Cyber criminals are constantly coming up with creative new ways to compromise your data, as seen in....

    2017 Internet Security Threat Report

  • 2

    Software Insurance reported how many stolen laptops in 2003?

    600,000

  • 3

    Computer items must be protected only until they loose their value. They must be protected to a degree consistent with their value.

    Principle of Adequate Protection

  • 4

    3 Main Types of Threats

    Natural, Unintentional, Intentional

  • 5

    3 other categories of software modification

    Trojan Horse, Virus, Trapdoor

  • 6

    5 other definitions of threats according to different organizations. Write on paper

    I remembered

  • 7

    Changing a bit or two can convert a working program into a failing one.

    True

  • 8

    Natural Threats

    Floods, Hurricanes, Tornadoes

  • 9

    It is a program that overtly does one thing while covertly doing another.

    Trojan Horse

  • 10

    Why is that software is vulnerable to modifications?

    Because it is susceptible to "off by one" errors

  • 11

    Is an act of exploiting a bug, design flaws or configuration oversight in an operating system or software application to gain elevated access to resources from an application or users. The result is that an application with more privileges than intended by the application developer or system administrator can perform unauthorized actions.

    Elevation of Privileges

  • 12

    Some of the biggest breaches in U.S. history occurred when?

    July 2019

  • 13

    Physical Damages

    Fire, Water, Pollution

  • 14

    Hardware Level: FABRICATION

    Substitution

  • 15

    An example of this is when a disgruntled employee may modify a crucial program so that it accesses the system date and halts abruptly after July 1. The employee might quit on May I and plan to be at a new job miles away by July.

    Logic Bomb

  • 16

    Integrity prevents what?

    Unauthorized Modification

  • 17

    7 Possible Signs of Identity Theft. Write on paper

    I remembered

  • 18

    a situation in which a person or program successfully identifies as another by falsifying data, to gain an illegitimate advantage

    Spoofing Attack

  • 19

    Data Level: INTERRUPTION

    Loss

  • 20

    It is done so that software cannot be deleted, destroyed, or replaced accidentally.

    Configuration Management

  • 21

    Compromise of Functions

    Error in Use, Abuse of Rights, Denial of Actions

  • 22

    responsible for risk management and determine the appropriate funding level for this activity.

    Designate a central group of employees

  • 23

    Availability prevents what?

    Denial of Authorized Access

  • 24

    4 Types of Identity Theft plus 1

    Criminal, Medical, Financial, Child Identity Theft, Synthetic Identity Theft

  • 25

    The first step in managing your risk

    Understanding your vulnerabilities

  • 26

    Voluntary Machine Slaughter is also called what?

    Machinicide

  • 27

    Certain measures, help you assess threats regularly

    Ensure team members are informed on current trends in cyber security so that it will be easier for them to identify new threats. Perform regular threat assessments.

  • 28

    5 key aspects to consider when developing your risk management strategy

    Assess risk and determine needs. Include a total stakeholder perspective. Designate a central group of employees. Implement appropriate policies and related controls. Monitor and evaluate policy and control effectiveness.

  • 29

    Because of software's high value to a commercial computing center, access to software is usually carefully controlled through a process called...

    Configuration Management

  • 30

    When used, an old version or release can be replaced with a newer version only when it has been thoroughly tested to verify that the improvements work correctly without degrading the functionality and performance of other functions and services.

    Configuration Management

  • 31

    Software Level: INTERRUPTION

    Deletion

  • 32

    The biggest attack of its kind in 2017.

    WannaCry Ransomware

  • 33

    Testing for vulnerabilities is critical to ensuring the continued security of your systems. By identifying weak points, you can develop a strategy for?

    Quick Response

  • 34

    Stealing, buying, finding, or hearing data requires no computer sophistication, whereas modifying or fabricating new data requires some understanding of the technology by which the data are transmitted or stored, as well as the format in which the data are maintained.

    Data Integrity

  • 35

    In this case, it may be very hard to detect that the software has been changed, let alone to determine the extent of the change.

    Software is enhanced

  • 36

    A deliberately modifying, destroying, manipulating, editing of data through unauthorized channels.

    Tampering

  • 37

    It's when a criminal misrepresents himself as another person during arrest to try to avoid a summons, prevent the discovery of a warrant issued in his real name or avoid an arrest or conviction record

    Criminal Identity Theft

  • 38

    Conduct penetration testing by modelling real-world threats in order to discover vulnerabilities.

    Perform regular threat assessments

  • 39

    defined as the potential for loss or damage when at threat exploits vulnerability

    Risk

  • 40

    When a team member resigns and you forget to disable their access to external accounts, change logins, or remove their names from company credit cards, this leaves your business open to

    Both intentional and unintentional threats

  • 41

    Examples of risk

    Financial Losses, Loss of Privacy, Reputational Damage, Legal Implications, Loss of Life

  • 42

    How would you reduce your potential for risk?

    Creating and implementing risk management plan

  • 43

    It is a more widespread and serious problem than either a software or hardware attack. Thus, data items have greater public value than hardware and software because more people know how to use or interpret data.

    Data Attack

  • 44

    Software is easy to ______ and vulnerable to ______.

    delete, modifications

  • 45

    Threat Classifications according to the Open Group

    Physical Damage, Natural Events, Loss of Essential Services, Compromise of Information, Technical Failures, Compromise of Functions

  • 46

    a possible danger that might exploit a vulnerability to breach security and cause possible harm.

    Threat

  • 47

    Because data are often available in a form people can read, the confidentiality of data is a major concern in computer security.

    True

  • 48

    It is usually the concern of a relatively small staff of computing center professionals.

    Hardware Security

  • 49

    accidental acts not intended to do serious damage to the hardware involved

    Involuntary Machine Slaughter

  • 50

    Although such attacks might be intentional, most are not; this abuse might be considered what?

    Involuntary Machine Slaughter

  • 51

    What is the 2nd principle of computer security?

    Principle of Adequate Protection

  • 52

    Most vulnerability is exploited by what?

    Automated Attackers

  • 53

    occurs when someone uses your personal identifying information and pretends to be you in order to commit fraud or to gain other financial benefits.

    Identity Theft

  • 54

    ensure that the appropriate end users are informed of any and all changes.

    Implement appropriate policies and related controls

  • 55

    A more serious attack, usually involves someone who actually wishes to harm the computer hardware or software.

    Voluntary Machine Slaughter

  • 56

    Natural Events

    Climatic, Seismic, Volcanic

  • 57

    Intentional Threats

    Spyware, Malware, Adware Companies, Actions of a disgruntled employee

  • 58

    A cyber attack in which the perpetrator seek to make a machine or network resources unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the internet.

    Denial of Services

  • 59

    Computer programs are written in a dialect intelligible primarily to computer professionals~ so a "leaked" source listing of a program might very well be meaningless to the general public.

    True

  • 60

    Sometimes the security of hardware components can be enhanced greatly by simple physical measures such as ______ and _____?

    locks, guards

  • 61

    Stakeholders include the business owners as well as employees, customers, and even vendors. All of these players have the potential to negatively impact the organization (potential threats) but at the same time they can be assets in helping to mitigate risk.

    Include a total stakeholder perspective

  • 62

    In particular, deliberate attacks on equipment, intending to limit availability, usually involve what?

    Theft or Destruction

  • 63

    Examples of intentional threats other than hacking

    Malware, Phishing Attacks, DDOS, Data Breaches, Cryptojacking

  • 64

    Loss of Essential Services

    Electrical Power, Air Conditioning, Telecommunication

  • 65

    There were ____ reported data breaches in ____, according to the _______________________________________________. That represents a __% increase over 2018.

    1,473, 2019, Identity Theft Resource Center's End-of-Year 2019 Data Breach Report, 17

  • 66

    This attack includes unauthorized copying of software.

    Software Theft

  • 67

    10 ways on how to help protect yourself against identity theft. Write your answers.

    I remembered

  • 68

    How does identity theft happen?

    Phishing, Skimming, Wifi Hacking, Dumpster Diving, Phone Scams, Data Breaches, Malware, Mail Theft, Child ID Theft, Tax ID Theft

  • 69

    Compromise of Information

    Eavesdropping, Theft of Media, Retrieval of Discarded Materials

  • 70

    Employee mistakenly accessing the wrong information.

    Unintentional Threat

  • 71

    Technical Failures

    Equipment, Software, Capacity Saturation

  • 72

    Questions to ask in determining your security vulnerabilities. Write on paper

    I remembered

  • 73

    The sources of risk are ever-changing, which means your team must be prepared to make any necessary adjustments to the framework. This can also involve incorporating new monitoring tools and techniques.

    Monitor and evaluate policy and control effectiveness

  • 74

    In what way worms and viruses could harm organizations?

    Exposure to an automated attack

  • 75

    Furthermore, it is possible to change a program so that it does all it did before, and then some.

    True

  • 76

    The list of the kinds of human attacks perpetrated on computers is almost endless

    True

  • 77

    An example of this is a program that ostensibly structures a listing of files belonging to a user may also modify the protection of all those files to permit access by another user.

    Extended Program Functioning

  • 78

    It is a specific type of Trojan horse that can be used to spread its "infection" from one computer to another

    Virus

  • 79

    A malicious intruder can ______ the software to enable it to perform functions you may not find desirable.

    enhance

  • 80

    A more complicated process is trying to reprocess used data items. With the proliferation of telecommunications among banks, a fabricator might intercept a message ordering one bank to credit a given amount to a certain person's account.

    Data Integrity

  • 81

    A threat can be either what?

    Intentional or Accidental

  • 82

    Data are especially vulnerable to modification. Small and skillfully done modifications may not be detected in ordinary ways. For instance, we saw in our truncated interest example that a criminal can perform what is known as....

    Salami Attack

  • 83

    What are some 5 examples of what identity thieves might do with your sensitive personal information? Write on paper

    I remembered

  • 84

    These threats may be uncontrollable and often difficult or impossible to identify in advance.

    Worms, Viruses, WannaCry Ransomware

  • 85

    When was WannaCry Ransomware began bombarding computers and networks?

    May 12, 2017

  • 86

    What happens to my information after identity theft?

    Steal your money or benefits. Sell it on the dark web. Impersonate you.

  • 87

    Hardware Level: INTERRUPTION

    DOS

  • 88

    It happens when an application or system does not adopt controls to properly track and log users' actions, thus permitting malicious manipulation or forging the identification of new actions.

    Repudiation Attack

  • 89

    This determines the best approaches to protecting a system against a specific threat, along with assessing different types of threats.

    Perform regular threat assessments

  • 90

    It refers to a newly discovered incident that has the potential to harm a system or organization overall.

    Threat

  • 91

    It's a program that has a secret entry point information leaks in a program: code that makes information accessible to unauthorized people or programs

    Trapdoor

  • 92

    Confidentiality prevents what?

    Unauthorized Disclosure

  • 93

    In data confidentiality, data can be gathered by many means...

    Tapping wires, Planting bugs in output devices, Sifting through trash receptacles, Monitoring electromagnetic radiation, Bribing key employees, Inferring one data point from other values, Requesting the data

  • 94

    refers to a known weakness of an asset (resource) that can be exploited by one or more attackers. In other words, it is a known issue that allows an attack to succeed.

    Vulnerability

  • 95

    When it comes to designing and implementing a risk assessment framework, it is critical to prioritize the most important breaches that need to be addressed. Although frequency may differ in each organization, this level of assessment must be done on a regular, recurring basis.

    Assess risk and determine needs

  • 96

    Examples of unintentional threats other than computer malfunction and natural disasters

    Accidental Data Exposure, Misconfiguration, Lost Devices, Outdated Software, Weak Passwords, Human Error, Inadequate Security Training

  • 97

    Why are worms and viruses categorized as threats? because they can also cause a ____________________

    harm to an organization

  • 98

    Hardware Level: INTERCEPTION

    Theft

  • 99

    It is a larger problem, extending to all programmers and analysts who create or modify programs.

    Software Security

  • 100

    The crook shaves a little from many accounts and puts these shavings together to form a valuable result.

    Salami Attack