記憶度
15問
35問
0問
0問
0問
アカウント登録して、解答結果を保存しよう
問題一覧
1
It refers to a newly discovered incident that has the potential to harm a system or organization overall.
Threat
2
3 Main Types of Threats
Natural, Unintentional, Intentional
3
Natural Threats
Floods, Hurricanes, Tornadoes
4
Employee mistakenly accessing the wrong information.
Unintentional Threat
5
Intentional Threats
Spyware, Malware, Adware Companies, Actions of a disgruntled employee
6
Why are worms and viruses categorized as threats? because they can also cause a ____________________
harm to an organization
7
In what way worms and viruses could harm organizations?
Exposure to an automated attack
8
When was WannaCry Ransomware began bombarding computers and networks?
May 12, 2017
9
The biggest attack of its kind in 2017.
WannaCry Ransomware
10
Cyber criminals are constantly coming up with creative new ways to compromise your data, as seen in....
2017 Internet Security Threat Report
11
These threats may be uncontrollable and often difficult or impossible to identify in advance.
Worms, Viruses, WannaCry Ransomware
12
Certain measures, help you assess threats regularly
Ensure team members are informed on current trends in cyber security so that it will be easier for them to identify new threats. Perform regular threat assessments.
13
This determines the best approaches to protecting a system against a specific threat, along with assessing different types of threats.
Perform regular threat assessments
14
Conduct penetration testing by modelling real-world threats in order to discover vulnerabilities.
Perform regular threat assessments
15
refers to a known weakness of an asset (resource) that can be exploited by one or more attackers. In other words, it is a known issue that allows an attack to succeed.
Vulnerability
16
When a team member resigns and you forget to disable their access to external accounts, change logins, or remove their names from company credit cards, this leaves your business open to
Both intentional and unintentional threats
17
Most vulnerability is exploited by what?
Automated Attackers
18
Testing for vulnerabilities is critical to ensuring the continued security of your systems. By identifying weak points, you can develop a strategy for?
Quick Response
19
The first step in managing your risk
Understanding your vulnerabilities
20
Questions to ask in determining your security vulnerabilities. Write on paper
I remembered
21
defined as the potential for loss or damage when at threat exploits vulnerability
Risk
22
Examples of risk
Financial Losses, Loss of Privacy, Reputational Damage, Legal Implications, Loss of Life
23
How would you reduce your potential for risk?
Creating and implementing risk management plan
24
5 key aspects to consider when developing your risk management strategy
Assess risk and determine needs. Include a total stakeholder perspective. Designate a central group of employees. Implement appropriate policies and related controls. Monitor and evaluate policy and control effectiveness.
25
When it comes to designing and implementing a risk assessment framework, it is critical to prioritize the most important breaches that need to be addressed. Although frequency may differ in each organization, this level of assessment must be done on a regular, recurring basis.
Assess risk and determine needs
26
Stakeholders include the business owners as well as employees, customers, and even vendors. All of these players have the potential to negatively impact the organization (potential threats) but at the same time they can be assets in helping to mitigate risk.
Include a total stakeholder perspective
27
responsible for risk management and determine the appropriate funding level for this activity.
Designate a central group of employees
28
ensure that the appropriate end users are informed of any and all changes.
Implement appropriate policies and related controls
29
The sources of risk are ever-changing, which means your team must be prepared to make any necessary adjustments to the framework. This can also involve incorporating new monitoring tools and techniques.
Monitor and evaluate policy and control effectiveness
30
a possible danger that might exploit a vulnerability to breach security and cause possible harm.
Threat
31
A threat can be either what?
Intentional or Accidental
32
Examples of intentional threats other than hacking
Malware, Phishing Attacks, DDOS, Data Breaches, Cryptojacking
33
Examples of unintentional threats other than computer malfunction and natural disasters
Accidental Data Exposure, Misconfiguration, Lost Devices, Outdated Software, Weak Passwords, Human Error, Inadequate Security Training
34
5 other definitions of threats according to different organizations. Write on paper
I remembered
35
Threat Classifications according to the Open Group
Physical Damage, Natural Events, Loss of Essential Services, Compromise of Information, Technical Failures, Compromise of Functions
36
Physical Damages
Fire, Water, Pollution
37
Natural Events
Climatic, Seismic, Volcanic
38
Loss of Essential Services
Electrical Power, Air Conditioning, Telecommunication
39
Compromise of Information
Eavesdropping, Theft of Media, Retrieval of Discarded Materials
40
Technical Failures
Equipment, Software, Capacity Saturation
41
Compromise of Functions
Error in Use, Abuse of Rights, Denial of Actions
42
a situation in which a person or program successfully identifies as another by falsifying data, to gain an illegitimate advantage
Spoofing Attack
43
A deliberately modifying, destroying, manipulating, editing of data through unauthorized channels.
Tampering
44
It happens when an application or system does not adopt controls to properly track and log users' actions, thus permitting malicious manipulation or forging the identification of new actions.
Repudiation Attack
45
A cyber attack in which the perpetrator seek to make a machine or network resources unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the internet.
Denial of Services
46
Is an act of exploiting a bug, design flaws or configuration oversight in an operating system or software application to gain elevated access to resources from an application or users. The result is that an application with more privileges than intended by the application developer or system administrator can perform unauthorized actions.
Elevation of Privileges
47
Hardware Level: INTERRUPTION
DOS
48
Hardware Level: INTERCEPTION
Theft
49
Hardware Level: FABRICATION
Substitution
50
Software Level: INTERRUPTION
Deletion
51
Data Level: INTERRUPTION
Loss
52
Although such attacks might be intentional, most are not; this abuse might be considered what?
Involuntary Machine Slaughter
53
accidental acts not intended to do serious damage to the hardware involved
Involuntary Machine Slaughter
54
A more serious attack, usually involves someone who actually wishes to harm the computer hardware or software.
Voluntary Machine Slaughter
55
Voluntary Machine Slaughter is also called what?
Machinicide
56
The list of the kinds of human attacks perpetrated on computers is almost endless
True
57
In particular, deliberate attacks on equipment, intending to limit availability, usually involve what?
Theft or Destruction
58
Sometimes the security of hardware components can be enhanced greatly by simple physical measures such as ______ and _____?
locks, guards
59
Software Insurance reported how many stolen laptops in 2003?
600,000
60
Furthermore, it is possible to change a program so that it does all it did before, and then some.
True
61
A malicious intruder can ______ the software to enable it to perform functions you may not find desirable.
enhance
62
In this case, it may be very hard to detect that the software has been changed, let alone to determine the extent of the change.
Software is enhanced
63
Because of software's high value to a commercial computing center, access to software is usually carefully controlled through a process called...
Configuration Management
64
It is done so that software cannot be deleted, destroyed, or replaced accidentally.
Configuration Management
65
When used, an old version or release can be replaced with a newer version only when it has been thoroughly tested to verify that the improvements work correctly without degrading the functionality and performance of other functions and services.
Configuration Management
66
Software is easy to ______ and vulnerable to ______.
delete, modifications
67
Why is that software is vulnerable to modifications?
Because it is susceptible to "off by one" errors
68
Changing a bit or two can convert a working program into a failing one.
True
69
An example of this is when a disgruntled employee may modify a crucial program so that it accesses the system date and halts abruptly after July 1. The employee might quit on May I and plan to be at a new job miles away by July.
Logic Bomb
70
An example of this is a program that ostensibly structures a listing of files belonging to a user may also modify the protection of all those files to permit access by another user.
Extended Program Functioning
71
3 other categories of software modification
Trojan Horse, Virus, Trapdoor
72
It is a program that overtly does one thing while covertly doing another.
Trojan Horse
73
It is a specific type of Trojan horse that can be used to spread its "infection" from one computer to another
Virus
74
It's a program that has a secret entry point information leaks in a program: code that makes information accessible to unauthorized people or programs
Trapdoor
75
This attack includes unauthorized copying of software.
Software Theft
76
It is usually the concern of a relatively small staff of computing center professionals.
Hardware Security
77
It is a larger problem, extending to all programmers and analysts who create or modify programs.
Software Security
78
Computer programs are written in a dialect intelligible primarily to computer professionals~ so a "leaked" source listing of a program might very well be meaningless to the general public.
True
79
It is a more widespread and serious problem than either a software or hardware attack. Thus, data items have greater public value than hardware and software because more people know how to use or interpret data.
Data Attack
80
What is the 2nd principle of computer security?
Principle of Adequate Protection
81
Computer items must be protected only until they loose their value. They must be protected to a degree consistent with their value.
Principle of Adequate Protection
82
Confidentiality prevents what?
Unauthorized Disclosure
83
Integrity prevents what?
Unauthorized Modification
84
Availability prevents what?
Denial of Authorized Access
85
In data confidentiality, data can be gathered by many means...
Tapping wires, Planting bugs in output devices, Sifting through trash receptacles, Monitoring electromagnetic radiation, Bribing key employees, Inferring one data point from other values, Requesting the data
86
Because data are often available in a form people can read, the confidentiality of data is a major concern in computer security.
True
87
Stealing, buying, finding, or hearing data requires no computer sophistication, whereas modifying or fabricating new data requires some understanding of the technology by which the data are transmitted or stored, as well as the format in which the data are maintained.
Data Integrity
88
The crook shaves a little from many accounts and puts these shavings together to form a valuable result.
Salami Attack
89
Data are especially vulnerable to modification. Small and skillfully done modifications may not be detected in ordinary ways. For instance, we saw in our truncated interest example that a criminal can perform what is known as....
Salami Attack
90
A more complicated process is trying to reprocess used data items. With the proliferation of telecommunications among banks, a fabricator might intercept a message ordering one bank to credit a given amount to a certain person's account.
Data Integrity
91
occurs when someone uses your personal identifying information and pretends to be you in order to commit fraud or to gain other financial benefits.
Identity Theft
92
What are some 5 examples of what identity thieves might do with your sensitive personal information? Write on paper
I remembered
93
There were ____ reported data breaches in ____, according to the _______________________________________________. That represents a __% increase over 2018.
1,473, 2019, Identity Theft Resource Center's End-of-Year 2019 Data Breach Report, 17
94
Some of the biggest breaches in U.S. history occurred when?
July 2019
95
How does identity theft happen?
Phishing, Skimming, Wifi Hacking, Dumpster Diving, Phone Scams, Data Breaches, Malware, Mail Theft, Child ID Theft, Tax ID Theft
96
What happens to my information after identity theft?
Steal your money or benefits. Sell it on the dark web. Impersonate you.
97
7 Possible Signs of Identity Theft. Write on paper
I remembered
98
10 ways on how to help protect yourself against identity theft. Write your answers.
I remembered
99
4 Types of Identity Theft plus 1
Criminal, Medical, Financial, Child Identity Theft, Synthetic Identity Theft
100
It's when a criminal misrepresents himself as another person during arrest to try to avoid a summons, prevent the discovery of a warrant issued in his real name or avoid an arrest or conviction record
Criminal Identity Theft