暗記メーカー
ログイン
INFO. ASSURANCE &SECURITY
  • Jamaica Rose Gilo

  • 問題数 100 • 11/23/2024

    記憶度

    完璧

    15

    覚えた

    35

    うろ覚え

    0

    苦手

    0

    未解答

    0

    アカウント登録して、解答結果を保存しよう

    問題一覧

  • 1

    It refers to a newly discovered incident that has the potential to harm a system or organization overall.

    Threat

  • 2

    3 Main Types of Threats

    Natural, Unintentional, Intentional

  • 3

    Natural Threats

    Floods, Hurricanes, Tornadoes

  • 4

    Employee mistakenly accessing the wrong information.

    Unintentional Threat

  • 5

    Intentional Threats

    Spyware, Malware, Adware Companies, Actions of a disgruntled employee

  • 6

    Why are worms and viruses categorized as threats? because they can also cause a ____________________

    harm to an organization

  • 7

    In what way worms and viruses could harm organizations?

    Exposure to an automated attack

  • 8

    When was WannaCry Ransomware began bombarding computers and networks?

    May 12, 2017

  • 9

    The biggest attack of its kind in 2017.

    WannaCry Ransomware

  • 10

    Cyber criminals are constantly coming up with creative new ways to compromise your data, as seen in....

    2017 Internet Security Threat Report

  • 11

    These threats may be uncontrollable and often difficult or impossible to identify in advance.

    Worms, Viruses, WannaCry Ransomware

  • 12

    Certain measures, help you assess threats regularly

    Ensure team members are informed on current trends in cyber security so that it will be easier for them to identify new threats. Perform regular threat assessments.

  • 13

    This determines the best approaches to protecting a system against a specific threat, along with assessing different types of threats.

    Perform regular threat assessments

  • 14

    Conduct penetration testing by modelling real-world threats in order to discover vulnerabilities.

    Perform regular threat assessments

  • 15

    refers to a known weakness of an asset (resource) that can be exploited by one or more attackers. In other words, it is a known issue that allows an attack to succeed.

    Vulnerability

  • 16

    When a team member resigns and you forget to disable their access to external accounts, change logins, or remove their names from company credit cards, this leaves your business open to

    Both intentional and unintentional threats

  • 17

    Most vulnerability is exploited by what?

    Automated Attackers

  • 18

    Testing for vulnerabilities is critical to ensuring the continued security of your systems. By identifying weak points, you can develop a strategy for?

    Quick Response

  • 19

    The first step in managing your risk

    Understanding your vulnerabilities

  • 20

    Questions to ask in determining your security vulnerabilities. Write on paper

    I remembered

  • 21

    defined as the potential for loss or damage when at threat exploits vulnerability

    Risk

  • 22

    Examples of risk

    Financial Losses, Loss of Privacy, Reputational Damage, Legal Implications, Loss of Life

  • 23

    How would you reduce your potential for risk?

    Creating and implementing risk management plan

  • 24

    5 key aspects to consider when developing your risk management strategy

    Assess risk and determine needs. Include a total stakeholder perspective. Designate a central group of employees. Implement appropriate policies and related controls. Monitor and evaluate policy and control effectiveness.

  • 25

    When it comes to designing and implementing a risk assessment framework, it is critical to prioritize the most important breaches that need to be addressed. Although frequency may differ in each organization, this level of assessment must be done on a regular, recurring basis.

    Assess risk and determine needs

  • 26

    Stakeholders include the business owners as well as employees, customers, and even vendors. All of these players have the potential to negatively impact the organization (potential threats) but at the same time they can be assets in helping to mitigate risk.

    Include a total stakeholder perspective

  • 27

    responsible for risk management and determine the appropriate funding level for this activity.

    Designate a central group of employees

  • 28

    ensure that the appropriate end users are informed of any and all changes.

    Implement appropriate policies and related controls

  • 29

    The sources of risk are ever-changing, which means your team must be prepared to make any necessary adjustments to the framework. This can also involve incorporating new monitoring tools and techniques.

    Monitor and evaluate policy and control effectiveness

  • 30

    a possible danger that might exploit a vulnerability to breach security and cause possible harm.

    Threat

  • 31

    A threat can be either what?

    Intentional or Accidental

  • 32

    Examples of intentional threats other than hacking

    Malware, Phishing Attacks, DDOS, Data Breaches, Cryptojacking

  • 33

    Examples of unintentional threats other than computer malfunction and natural disasters

    Accidental Data Exposure, Misconfiguration, Lost Devices, Outdated Software, Weak Passwords, Human Error, Inadequate Security Training

  • 34

    5 other definitions of threats according to different organizations. Write on paper

    I remembered

  • 35

    Threat Classifications according to the Open Group

    Physical Damage, Natural Events, Loss of Essential Services, Compromise of Information, Technical Failures, Compromise of Functions

  • 36

    Physical Damages

    Fire, Water, Pollution

  • 37

    Natural Events

    Climatic, Seismic, Volcanic

  • 38

    Loss of Essential Services

    Electrical Power, Air Conditioning, Telecommunication

  • 39

    Compromise of Information

    Eavesdropping, Theft of Media, Retrieval of Discarded Materials

  • 40

    Technical Failures

    Equipment, Software, Capacity Saturation

  • 41

    Compromise of Functions

    Error in Use, Abuse of Rights, Denial of Actions

  • 42

    a situation in which a person or program successfully identifies as another by falsifying data, to gain an illegitimate advantage

    Spoofing Attack

  • 43

    A deliberately modifying, destroying, manipulating, editing of data through unauthorized channels.

    Tampering

  • 44

    It happens when an application or system does not adopt controls to properly track and log users' actions, thus permitting malicious manipulation or forging the identification of new actions.

    Repudiation Attack

  • 45

    A cyber attack in which the perpetrator seek to make a machine or network resources unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the internet.

    Denial of Services

  • 46

    Is an act of exploiting a bug, design flaws or configuration oversight in an operating system or software application to gain elevated access to resources from an application or users. The result is that an application with more privileges than intended by the application developer or system administrator can perform unauthorized actions.

    Elevation of Privileges

  • 47

    Hardware Level: INTERRUPTION

    DOS

  • 48

    Hardware Level: INTERCEPTION

    Theft

  • 49

    Hardware Level: FABRICATION

    Substitution

  • 50

    Software Level: INTERRUPTION

    Deletion

  • 51

    Data Level: INTERRUPTION

    Loss

  • 52

    Although such attacks might be intentional, most are not; this abuse might be considered what?

    Involuntary Machine Slaughter

  • 53

    accidental acts not intended to do serious damage to the hardware involved

    Involuntary Machine Slaughter

  • 54

    A more serious attack, usually involves someone who actually wishes to harm the computer hardware or software.

    Voluntary Machine Slaughter

  • 55

    Voluntary Machine Slaughter is also called what?

    Machinicide

  • 56

    The list of the kinds of human attacks perpetrated on computers is almost endless

    True

  • 57

    In particular, deliberate attacks on equipment, intending to limit availability, usually involve what?

    Theft or Destruction

  • 58

    Sometimes the security of hardware components can be enhanced greatly by simple physical measures such as ______ and _____?

    locks, guards

  • 59

    Software Insurance reported how many stolen laptops in 2003?

    600,000

  • 60

    Furthermore, it is possible to change a program so that it does all it did before, and then some.

    True

  • 61

    A malicious intruder can ______ the software to enable it to perform functions you may not find desirable.

    enhance

  • 62

    In this case, it may be very hard to detect that the software has been changed, let alone to determine the extent of the change.

    Software is enhanced

  • 63

    Because of software's high value to a commercial computing center, access to software is usually carefully controlled through a process called...

    Configuration Management

  • 64

    It is done so that software cannot be deleted, destroyed, or replaced accidentally.

    Configuration Management

  • 65

    When used, an old version or release can be replaced with a newer version only when it has been thoroughly tested to verify that the improvements work correctly without degrading the functionality and performance of other functions and services.

    Configuration Management

  • 66

    Software is easy to ______ and vulnerable to ______.

    delete, modifications

  • 67

    Why is that software is vulnerable to modifications?

    Because it is susceptible to "off by one" errors

  • 68

    Changing a bit or two can convert a working program into a failing one.

    True

  • 69

    An example of this is when a disgruntled employee may modify a crucial program so that it accesses the system date and halts abruptly after July 1. The employee might quit on May I and plan to be at a new job miles away by July.

    Logic Bomb

  • 70

    An example of this is a program that ostensibly structures a listing of files belonging to a user may also modify the protection of all those files to permit access by another user.

    Extended Program Functioning

  • 71

    3 other categories of software modification

    Trojan Horse, Virus, Trapdoor

  • 72

    It is a program that overtly does one thing while covertly doing another.

    Trojan Horse

  • 73

    It is a specific type of Trojan horse that can be used to spread its "infection" from one computer to another

    Virus

  • 74

    It's a program that has a secret entry point information leaks in a program: code that makes information accessible to unauthorized people or programs

    Trapdoor

  • 75

    This attack includes unauthorized copying of software.

    Software Theft

  • 76

    It is usually the concern of a relatively small staff of computing center professionals.

    Hardware Security

  • 77

    It is a larger problem, extending to all programmers and analysts who create or modify programs.

    Software Security

  • 78

    Computer programs are written in a dialect intelligible primarily to computer professionals~ so a "leaked" source listing of a program might very well be meaningless to the general public.

    True

  • 79

    It is a more widespread and serious problem than either a software or hardware attack. Thus, data items have greater public value than hardware and software because more people know how to use or interpret data.

    Data Attack

  • 80

    What is the 2nd principle of computer security?

    Principle of Adequate Protection

  • 81

    Computer items must be protected only until they loose their value. They must be protected to a degree consistent with their value.

    Principle of Adequate Protection

  • 82

    Confidentiality prevents what?

    Unauthorized Disclosure

  • 83

    Integrity prevents what?

    Unauthorized Modification

  • 84

    Availability prevents what?

    Denial of Authorized Access

  • 85

    In data confidentiality, data can be gathered by many means...

    Tapping wires, Planting bugs in output devices, Sifting through trash receptacles, Monitoring electromagnetic radiation, Bribing key employees, Inferring one data point from other values, Requesting the data

  • 86

    Because data are often available in a form people can read, the confidentiality of data is a major concern in computer security.

    True

  • 87

    Stealing, buying, finding, or hearing data requires no computer sophistication, whereas modifying or fabricating new data requires some understanding of the technology by which the data are transmitted or stored, as well as the format in which the data are maintained.

    Data Integrity

  • 88

    The crook shaves a little from many accounts and puts these shavings together to form a valuable result.

    Salami Attack

  • 89

    Data are especially vulnerable to modification. Small and skillfully done modifications may not be detected in ordinary ways. For instance, we saw in our truncated interest example that a criminal can perform what is known as....

    Salami Attack

  • 90

    A more complicated process is trying to reprocess used data items. With the proliferation of telecommunications among banks, a fabricator might intercept a message ordering one bank to credit a given amount to a certain person's account.

    Data Integrity

  • 91

    occurs when someone uses your personal identifying information and pretends to be you in order to commit fraud or to gain other financial benefits.

    Identity Theft

  • 92

    What are some 5 examples of what identity thieves might do with your sensitive personal information? Write on paper

    I remembered

  • 93

    There were ____ reported data breaches in ____, according to the _______________________________________________. That represents a __% increase over 2018.

    1,473, 2019, Identity Theft Resource Center's End-of-Year 2019 Data Breach Report, 17

  • 94

    Some of the biggest breaches in U.S. history occurred when?

    July 2019

  • 95

    How does identity theft happen?

    Phishing, Skimming, Wifi Hacking, Dumpster Diving, Phone Scams, Data Breaches, Malware, Mail Theft, Child ID Theft, Tax ID Theft

  • 96

    What happens to my information after identity theft?

    Steal your money or benefits. Sell it on the dark web. Impersonate you.

  • 97

    7 Possible Signs of Identity Theft. Write on paper

    I remembered

  • 98

    10 ways on how to help protect yourself against identity theft. Write your answers.

    I remembered

  • 99

    4 Types of Identity Theft plus 1

    Criminal, Medical, Financial, Child Identity Theft, Synthetic Identity Theft

  • 100

    It's when a criminal misrepresents himself as another person during arrest to try to avoid a summons, prevent the discovery of a warrant issued in his real name or avoid an arrest or conviction record

    Criminal Identity Theft