記憶度
15問
35問
0問
0問
0問
アカウント登録して、解答結果を保存しよう
問題一覧
1
Cyber criminals are constantly coming up with creative new ways to compromise your data, as seen in....
2017 Internet Security Threat Report
2
Software Insurance reported how many stolen laptops in 2003?
600,000
3
Computer items must be protected only until they loose their value. They must be protected to a degree consistent with their value.
Principle of Adequate Protection
4
3 Main Types of Threats
Natural, Unintentional, Intentional
5
3 other categories of software modification
Trojan Horse, Virus, Trapdoor
6
5 other definitions of threats according to different organizations. Write on paper
I remembered
7
Changing a bit or two can convert a working program into a failing one.
True
8
Natural Threats
Floods, Hurricanes, Tornadoes
9
It is a program that overtly does one thing while covertly doing another.
Trojan Horse
10
Why is that software is vulnerable to modifications?
Because it is susceptible to "off by one" errors
11
Is an act of exploiting a bug, design flaws or configuration oversight in an operating system or software application to gain elevated access to resources from an application or users. The result is that an application with more privileges than intended by the application developer or system administrator can perform unauthorized actions.
Elevation of Privileges
12
Some of the biggest breaches in U.S. history occurred when?
July 2019
13
Physical Damages
Fire, Water, Pollution
14
Hardware Level: FABRICATION
Substitution
15
An example of this is when a disgruntled employee may modify a crucial program so that it accesses the system date and halts abruptly after July 1. The employee might quit on May I and plan to be at a new job miles away by July.
Logic Bomb
16
Integrity prevents what?
Unauthorized Modification
17
7 Possible Signs of Identity Theft. Write on paper
I remembered
18
a situation in which a person or program successfully identifies as another by falsifying data, to gain an illegitimate advantage
Spoofing Attack
19
Data Level: INTERRUPTION
Loss
20
It is done so that software cannot be deleted, destroyed, or replaced accidentally.
Configuration Management
21
Compromise of Functions
Error in Use, Abuse of Rights, Denial of Actions
22
responsible for risk management and determine the appropriate funding level for this activity.
Designate a central group of employees
23
Availability prevents what?
Denial of Authorized Access
24
4 Types of Identity Theft plus 1
Criminal, Medical, Financial, Child Identity Theft, Synthetic Identity Theft
25
The first step in managing your risk
Understanding your vulnerabilities
26
Voluntary Machine Slaughter is also called what?
Machinicide
27
Certain measures, help you assess threats regularly
Ensure team members are informed on current trends in cyber security so that it will be easier for them to identify new threats. Perform regular threat assessments.
28
5 key aspects to consider when developing your risk management strategy
Assess risk and determine needs. Include a total stakeholder perspective. Designate a central group of employees. Implement appropriate policies and related controls. Monitor and evaluate policy and control effectiveness.
29
Because of software's high value to a commercial computing center, access to software is usually carefully controlled through a process called...
Configuration Management
30
When used, an old version or release can be replaced with a newer version only when it has been thoroughly tested to verify that the improvements work correctly without degrading the functionality and performance of other functions and services.
Configuration Management
31
Software Level: INTERRUPTION
Deletion
32
The biggest attack of its kind in 2017.
WannaCry Ransomware
33
Testing for vulnerabilities is critical to ensuring the continued security of your systems. By identifying weak points, you can develop a strategy for?
Quick Response
34
Stealing, buying, finding, or hearing data requires no computer sophistication, whereas modifying or fabricating new data requires some understanding of the technology by which the data are transmitted or stored, as well as the format in which the data are maintained.
Data Integrity
35
In this case, it may be very hard to detect that the software has been changed, let alone to determine the extent of the change.
Software is enhanced
36
A deliberately modifying, destroying, manipulating, editing of data through unauthorized channels.
Tampering
37
It's when a criminal misrepresents himself as another person during arrest to try to avoid a summons, prevent the discovery of a warrant issued in his real name or avoid an arrest or conviction record
Criminal Identity Theft
38
Conduct penetration testing by modelling real-world threats in order to discover vulnerabilities.
Perform regular threat assessments
39
defined as the potential for loss or damage when at threat exploits vulnerability
Risk
40
When a team member resigns and you forget to disable their access to external accounts, change logins, or remove their names from company credit cards, this leaves your business open to
Both intentional and unintentional threats
41
Examples of risk
Financial Losses, Loss of Privacy, Reputational Damage, Legal Implications, Loss of Life
42
How would you reduce your potential for risk?
Creating and implementing risk management plan
43
It is a more widespread and serious problem than either a software or hardware attack. Thus, data items have greater public value than hardware and software because more people know how to use or interpret data.
Data Attack
44
Software is easy to ______ and vulnerable to ______.
delete, modifications
45
Threat Classifications according to the Open Group
Physical Damage, Natural Events, Loss of Essential Services, Compromise of Information, Technical Failures, Compromise of Functions
46
a possible danger that might exploit a vulnerability to breach security and cause possible harm.
Threat
47
Because data are often available in a form people can read, the confidentiality of data is a major concern in computer security.
True
48
It is usually the concern of a relatively small staff of computing center professionals.
Hardware Security
49
accidental acts not intended to do serious damage to the hardware involved
Involuntary Machine Slaughter
50
Although such attacks might be intentional, most are not; this abuse might be considered what?
Involuntary Machine Slaughter
51
What is the 2nd principle of computer security?
Principle of Adequate Protection
52
Most vulnerability is exploited by what?
Automated Attackers
53
occurs when someone uses your personal identifying information and pretends to be you in order to commit fraud or to gain other financial benefits.
Identity Theft
54
ensure that the appropriate end users are informed of any and all changes.
Implement appropriate policies and related controls
55
A more serious attack, usually involves someone who actually wishes to harm the computer hardware or software.
Voluntary Machine Slaughter
56
Natural Events
Climatic, Seismic, Volcanic
57
Intentional Threats
Spyware, Malware, Adware Companies, Actions of a disgruntled employee
58
A cyber attack in which the perpetrator seek to make a machine or network resources unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the internet.
Denial of Services
59
Computer programs are written in a dialect intelligible primarily to computer professionals~ so a "leaked" source listing of a program might very well be meaningless to the general public.
True
60
Sometimes the security of hardware components can be enhanced greatly by simple physical measures such as ______ and _____?
locks, guards
61
Stakeholders include the business owners as well as employees, customers, and even vendors. All of these players have the potential to negatively impact the organization (potential threats) but at the same time they can be assets in helping to mitigate risk.
Include a total stakeholder perspective
62
In particular, deliberate attacks on equipment, intending to limit availability, usually involve what?
Theft or Destruction
63
Examples of intentional threats other than hacking
Malware, Phishing Attacks, DDOS, Data Breaches, Cryptojacking
64
Loss of Essential Services
Electrical Power, Air Conditioning, Telecommunication
65
There were ____ reported data breaches in ____, according to the _______________________________________________. That represents a __% increase over 2018.
1,473, 2019, Identity Theft Resource Center's End-of-Year 2019 Data Breach Report, 17
66
This attack includes unauthorized copying of software.
Software Theft
67
10 ways on how to help protect yourself against identity theft. Write your answers.
I remembered
68
How does identity theft happen?
Phishing, Skimming, Wifi Hacking, Dumpster Diving, Phone Scams, Data Breaches, Malware, Mail Theft, Child ID Theft, Tax ID Theft
69
Compromise of Information
Eavesdropping, Theft of Media, Retrieval of Discarded Materials
70
Employee mistakenly accessing the wrong information.
Unintentional Threat
71
Technical Failures
Equipment, Software, Capacity Saturation
72
Questions to ask in determining your security vulnerabilities. Write on paper
I remembered
73
The sources of risk are ever-changing, which means your team must be prepared to make any necessary adjustments to the framework. This can also involve incorporating new monitoring tools and techniques.
Monitor and evaluate policy and control effectiveness
74
In what way worms and viruses could harm organizations?
Exposure to an automated attack
75
Furthermore, it is possible to change a program so that it does all it did before, and then some.
True
76
The list of the kinds of human attacks perpetrated on computers is almost endless
True
77
An example of this is a program that ostensibly structures a listing of files belonging to a user may also modify the protection of all those files to permit access by another user.
Extended Program Functioning
78
It is a specific type of Trojan horse that can be used to spread its "infection" from one computer to another
Virus
79
A malicious intruder can ______ the software to enable it to perform functions you may not find desirable.
enhance
80
A more complicated process is trying to reprocess used data items. With the proliferation of telecommunications among banks, a fabricator might intercept a message ordering one bank to credit a given amount to a certain person's account.
Data Integrity
81
A threat can be either what?
Intentional or Accidental
82
Data are especially vulnerable to modification. Small and skillfully done modifications may not be detected in ordinary ways. For instance, we saw in our truncated interest example that a criminal can perform what is known as....
Salami Attack
83
What are some 5 examples of what identity thieves might do with your sensitive personal information? Write on paper
I remembered
84
These threats may be uncontrollable and often difficult or impossible to identify in advance.
Worms, Viruses, WannaCry Ransomware
85
When was WannaCry Ransomware began bombarding computers and networks?
May 12, 2017
86
What happens to my information after identity theft?
Steal your money or benefits. Sell it on the dark web. Impersonate you.
87
Hardware Level: INTERRUPTION
DOS
88
It happens when an application or system does not adopt controls to properly track and log users' actions, thus permitting malicious manipulation or forging the identification of new actions.
Repudiation Attack
89
This determines the best approaches to protecting a system against a specific threat, along with assessing different types of threats.
Perform regular threat assessments
90
It refers to a newly discovered incident that has the potential to harm a system or organization overall.
Threat
91
It's a program that has a secret entry point information leaks in a program: code that makes information accessible to unauthorized people or programs
Trapdoor
92
Confidentiality prevents what?
Unauthorized Disclosure
93
In data confidentiality, data can be gathered by many means...
Tapping wires, Planting bugs in output devices, Sifting through trash receptacles, Monitoring electromagnetic radiation, Bribing key employees, Inferring one data point from other values, Requesting the data
94
refers to a known weakness of an asset (resource) that can be exploited by one or more attackers. In other words, it is a known issue that allows an attack to succeed.
Vulnerability
95
When it comes to designing and implementing a risk assessment framework, it is critical to prioritize the most important breaches that need to be addressed. Although frequency may differ in each organization, this level of assessment must be done on a regular, recurring basis.
Assess risk and determine needs
96
Examples of unintentional threats other than computer malfunction and natural disasters
Accidental Data Exposure, Misconfiguration, Lost Devices, Outdated Software, Weak Passwords, Human Error, Inadequate Security Training
97
Why are worms and viruses categorized as threats? because they can also cause a ____________________
harm to an organization
98
Hardware Level: INTERCEPTION
Theft
99
It is a larger problem, extending to all programmers and analysts who create or modify programs.
Software Security
100
The crook shaves a little from many accounts and puts these shavings together to form a valuable result.
Salami Attack