暗記メーカー
ログイン
chap 9
  • Lydster Joy Baquero Alonzo

  • 問題数 33 • 6/17/2024

    記憶度

    完璧

    4

    覚えた

    14

    うろ覚え

    0

    苦手

    0

    未解答

    0

    アカウント登録して、解答結果を保存しよう

    問題一覧

  • 1

    Unauthorized access to sensitive business and customer data.

    Data Breaches

  • 2

    Falling victim to phishing attacks can damage a business reputation, customers may lose trust in the organization’s ability to protect their information.

    Reputational Damage

  • 3

    System Crashes, Slow Performance or Disabling Critical Services and Application

    Operational/Service Disruption

  • 4

    Through the theft of financial information, fraudulent transactions or ransom demands.

    Financial Loss

  • 5

    Inaccessible until ransom is paid. If backups are not available or compromised. Business may permanently lose data.

    Data Encryption & Loss

  • 6

    “malicious software” designed to disrupt, damage or gain unauthorized access to computer systems or networks.

    MALWARE

  • 7

    Primary goal of ___ is to compromise the security and integrity of system, steal sensitive information, enable unauthorized access, can be spread such as infected email attachments, compromised websites, malicious downloads, or removable media.

    MALWARE

  • 8

    MALWARE short for “___” designed to disrupt, damage or gain unauthorized access to computer systems or networks.

    malicious software

  • 9

    ___ rely on user action or human intervention to spread. Propagation: File sharing, email attachments, infected removable media (flash drive), executing infected programs.

    VIRUSES

  • 10

    ___ encrypts files or locks down computer systems, rendering them inaccessible to users until a ransom is paid.

    RANSOMWARE

  • 11

    ____ capture and record keystrokes made by a user’s, enabling attackers to obtain sensitive information, password, credit card details and other confidential data.

    KEYLOGGERS

  • 12

    ____ is a common tactic used by cybercriminals to trick individuals into revealing sensitive information, such as login credentials or financial details.

    PHISHING

  • 13

    (email or text messages) - requesting personal information such as account numbers, passwords, PIN or pretext account verification.

    BANKING & FINANCIAL SCAMS

  • 14

    (emails or advertisements) - these messages may offer exclusive deals or discounts. Enticing recipients to click on malicious links.

    ONLINE SHOPPING SCAMS

  • 15

    (emails sent to job seekers) – offering lucrative job opportunities with well-known companies or abroad. Requesting passport details, bank account for employment verification.

    JOB OFFER SCAMS

  • 16

    (target users of popular social media platforms) - victims receive messages that appear from the official support team, claiming account security issues or unauthorized access.

    SOCIAL MEDIA ACCOUNT COMPROMISES

  • 17

    (emails or messages) - impersonating government agencies in the Philippines are sent to individuals claiming urgent notifications, tax, refunds or penalties

    GOVERNMENT AGENCY SCAMS

  • 18

    ____ refers to risks posed by individuals within an organization who have authorized access to sensitive data and misuse it intentionally or inadvertently. This can include employees, contractors, or partners with access to critical systems or information.

    INSIDER THREAT

  • 19

    intentionally exploit their access privileges to carry out harmful activities. Include theft, unauthorized disclosure of sensitive data, sabotage of system.

    MALICIOUS INSIDERS

  • 20

    unknowingly or carelessly compromise security through their actions or lack of adherence to policies and procedures.

    NEGLIGENT INSIDERS

  • 21

    access credentials have been compromised, either through external hacking or insider collusion.

    COMPROMISED INSIDERS

  • 22

    ___ intentionally steal confidential information such as customer records, intellectual property, with the intention of selling or using it for personal gain or to benefit a competitor

    DATA THEFT

  • 23

    misuse their privilege access rights to gain unauthorized access to systems, database or accounts, potentially for malicious purpose.

    UNAUTHORIZED SYSTEM ACCESS

  • 24

    This can be motivated by revenge, dissatisfaction by revenge, dissatisfaction or as an act of protest.

    SABOTAGE

  • 25

    intentionally or unintentionally shares sensitive or confidential information with unauthorized individuals or the public such as social media, personal email accounts or communication channels.

    UNAUTHORIZED DISCLOSURE

  • 26

    accidentally sending confidential information to the wrong recipients, leaving sensitive documents unattended.

    NEGLIGENT DATA HANDLING

  • 27

    leverages human psychology to manipulate individuals into divulging sensitive information or performing actions that compromise security. It often involves impersonation, manipulation, or exploiting trust to gain unauthorized access.

    SOCIAL ENGINEERING

  • 28

    attackers make phone calls pretending to be from a trusted organization or authority.

    PHONE SCAMS

  • 29

    create fraudulent websites that resemble legitimate ones.

    FAKE WEBSITES

  • 30

    attackers pose as technical support, contact individuals claiming that their device is infected or experiencing issues.

    KEYLOGGERS

  • 31

    impersonate someone else to gain trust and deceive individuals.

    IMPERSONATION ATTACKS

  • 32

    leave physical or digital in public spaces like flash drive, CD or download links.

    BAITING

  • 33

    exploit people’s goodwill by creating fake charity organization.

    CHARITY SCAMS