ログイン

INFO. ASSURANCE & SECURITY
33問 • 1年前
  • Jamaica Rose Gilo
  • 通報

    問題一覧

  • 1

    someone identifies himself as another person to obtain free medical care

    Medical Identity Theft

  • 2

    someone uses another person's identity or information to obtain credit, goods, services or benefits. This is the most common form of identity theft.

    Financial Identity Theft

  • 3

    someone uses a child's identity for various forms of personal gain

    Child Identity Theft

  • 4

    is a type of fraud in which a criminal combines real (usually stolen) and fake information to create a new identity, which is used to open fraudulent accounts and make fraudulent purchases

    Synthetic Identity Theft

  • 5

    It allows the criminal to steal money from any credit card companies or lenders who extend credit based on the fake identity.

    Synthetic Identity Theft

  • 6

    is when a bad actor steals the personal information and credentials of an unwitting individual in order to pose as them fo unauthorized purchases or financial transactions

    Identity Theft

  • 7

    can come in various forms, but in all cases the victim is left with damage to their credit, finances, reputation, and livelihood in many case

    Identity Theft

  • 8

    is a growing industry that keeps track of people's credit reports, financial activity, and social security number use

    Identity Theft Protection

  • 9

    Identity thieves increasingly use computer technology to obtain other people's personal information for identity fraud.

    High-Tech Identity Theft

  • 10

    "America's fastest growing crime problem"

    Identity Theft

  • 11

    One way is to continually check the accuracy of personal documents and promptly deal with any discrepancies.

    Identity Theft Protection

  • 12

    In addition, some government agencies and non-profit organizations provide similar assistance, typically with websites that have information and tools to help people avoid, remedy and report incidents of identity theft.

    Identity Theft Protection

  • 13

    What is the goal of computer security?

    Institute controls that preserve secrecy, integrity and availability.

  • 14

    controls that attempt to prevent exploitation of the vulnerabilities of computing systems

    Encryption, Software Controls, Hardware Controls, Overlapping Controls, Periodic Review

  • 15

    The most powerful tool in providing computer security is ______.

    coding

  • 16

    It provides secrecy of data.

    Encryption

  • 17

    It can also be used to achieve integrity, since data that cannot be read generally also cannot be changed.

    Encryption

  • 18

    It is important in protocols.

    Encryption

  • 19

    are agreed-upon sequences of actions to accomplish some task

    Protocols

  • 20

    These are the 2nd link in computer security and must be secure enough to excuse outside attack. As well as, must be maintained and developed so that one can be confident of the dependability of the programs.

    Programs

  • 21

    Kinds of Program Controls

    Development Controls, OS Controls, Internal Program Controls

  • 22

    which are standards under which a program is designed, coded, tested, and maintained

    Development Controls

  • 23

    which are limitations enforced by the operating system to protect each user from all other users

    OS Controls

  • 24

    enforce security restrictions, such as access limitations in a data base management program

    Internal Program Controls

  • 25

    These may use tools such as hardware components, encryption or information gathering. These can also generally affect users directly and so these are the 1st aspect in computer security that come to mind. Lastly, these must be DESIGNED.

    Software Controls

  • 26

    What are the goals of designed software controls?

    Ease of Use, Potency

  • 27

    3 levels of hardware controls

    Policies, Physical Controls, Effectiveness of Controls

  • 28

    People using controls must be convinced of the need for security; people will willingly cooperate with security requirements only if they understand why security is appropriate in each specific situation. Many users, however, are unaware of the need for security, especially in situations in which a group has recently undertaken computing task that was previously performed by a central computing department.

    Awareness of Problem

  • 29

    Of course, no control is effective unless it is used. The lock on a computer room door does no good if people block the door open. During World War 2 code clerks used outdated codes because they had already learned them and could encode messages rapidly. Unfortunately, the opposite side had already broken some of those codes and could decode those messages easily.

    Likelihood of Use

  • 30

    Controls must be used to be effective. They must be efficient, easy to use, and appropriate.

    Principle of Effectiveness

  • 31

    This principle implies that computer security controls must be efficient enough, in terms of time, memory space, human activity, or other resources used, so that using the control does not seriously affect the task being protected. Controls should be selective so that they do not exclude legitimate accesses.

    Principle of Effectiveness

  • 32

    Several different controls may apply to one exposure.

    Overlapping Controls

  • 33

    Few controls are permanently effective. Just when the security specialist finds a way to secure assets against certain kinds of attacks, the opposition doubles its efforts in an effort to defeat the security mechanism. Thus, judging the effectiveness of a control is an ongoing task.

    Periodic Review

  • Networking 2 quiz1

    Networking 2 quiz1

    Jamaica Rose Gilo · 83問 · 1年前

    Networking 2 quiz1

    Networking 2 quiz1

    83問 • 1年前
    Jamaica Rose Gilo

    MIDTERM-IT 313

    MIDTERM-IT 313

    Jamaica Rose Gilo · 100問 · 1年前

    MIDTERM-IT 313

    MIDTERM-IT 313

    100問 • 1年前
    Jamaica Rose Gilo

    MIDTERM-IT 313

    MIDTERM-IT 313

    Jamaica Rose Gilo · 94問 · 1年前

    MIDTERM-IT 313

    MIDTERM-IT 313

    94問 • 1年前
    Jamaica Rose Gilo

    MIDTERM-IT 313

    MIDTERM-IT 313

    Jamaica Rose Gilo · 58問 · 1年前

    MIDTERM-IT 313

    MIDTERM-IT 313

    58問 • 1年前
    Jamaica Rose Gilo

    MIDTERM-APPDEV 3 CHAPTER 5

    MIDTERM-APPDEV 3 CHAPTER 5

    Jamaica Rose Gilo · 42問 · 1年前

    MIDTERM-APPDEV 3 CHAPTER 5

    MIDTERM-APPDEV 3 CHAPTER 5

    42問 • 1年前
    Jamaica Rose Gilo

    MIDTERM-APPDEV 3 CHAPTER 4

    MIDTERM-APPDEV 3 CHAPTER 4

    Jamaica Rose Gilo · 48問 · 1年前

    MIDTERM-APPDEV 3 CHAPTER 4

    MIDTERM-APPDEV 3 CHAPTER 4

    48問 • 1年前
    Jamaica Rose Gilo

    MIDTERM-ADVANCED DBM C3 L2

    MIDTERM-ADVANCED DBM C3 L2

    Jamaica Rose Gilo · 97問 · 1年前

    MIDTERM-ADVANCED DBM C3 L2

    MIDTERM-ADVANCED DBM C3 L2

    97問 • 1年前
    Jamaica Rose Gilo

    Mga MALI mo!

    Mga MALI mo!

    Jamaica Rose Gilo · 29問 · 1年前

    Mga MALI mo!

    Mga MALI mo!

    29問 • 1年前
    Jamaica Rose Gilo

    INFO. ASSURANCE &SECURITY

    INFO. ASSURANCE &SECURITY

    Jamaica Rose Gilo · 100問 · 1年前

    INFO. ASSURANCE &SECURITY

    INFO. ASSURANCE &SECURITY

    100問 • 1年前
    Jamaica Rose Gilo

    3 BRANCHES OF THE PHIL. GOVERNMENT

    3 BRANCHES OF THE PHIL. GOVERNMENT

    Jamaica Rose Gilo · 20問 · 11ヶ月前

    3 BRANCHES OF THE PHIL. GOVERNMENT

    3 BRANCHES OF THE PHIL. GOVERNMENT

    20問 • 11ヶ月前
    Jamaica Rose Gilo

    ENVIRONMENTAL MANAGEMENT AND PROTECTION

    ENVIRONMENTAL MANAGEMENT AND PROTECTION

    Jamaica Rose Gilo · 16問 · 11ヶ月前

    ENVIRONMENTAL MANAGEMENT AND PROTECTION

    ENVIRONMENTAL MANAGEMENT AND PROTECTION

    16問 • 11ヶ月前
    Jamaica Rose Gilo

    ARTICLE VI-1987 CONST.

    ARTICLE VI-1987 CONST.

    Jamaica Rose Gilo · 16問 · 11ヶ月前

    ARTICLE VI-1987 CONST.

    ARTICLE VI-1987 CONST.

    16問 • 11ヶ月前
    Jamaica Rose Gilo

    ARTICLE 1-NATIONAL TERRITORY

    ARTICLE 1-NATIONAL TERRITORY

    Jamaica Rose Gilo · 10問 · 11ヶ月前

    ARTICLE 1-NATIONAL TERRITORY

    ARTICLE 1-NATIONAL TERRITORY

    10問 • 11ヶ月前
    Jamaica Rose Gilo

    ARTICLE II-DECLARATION FOR PRINCIPLES AND STATE POLICIES

    ARTICLE II-DECLARATION FOR PRINCIPLES AND STATE POLICIES

    Jamaica Rose Gilo · 11問 · 11ヶ月前

    ARTICLE II-DECLARATION FOR PRINCIPLES AND STATE POLICIES

    ARTICLE II-DECLARATION FOR PRINCIPLES AND STATE POLICIES

    11問 • 11ヶ月前
    Jamaica Rose Gilo

    ARTICLE III

    ARTICLE III

    Jamaica Rose Gilo · 6問 · 11ヶ月前

    ARTICLE III

    ARTICLE III

    6問 • 11ヶ月前
    Jamaica Rose Gilo

    BILL OF RIGHTS

    BILL OF RIGHTS

    Jamaica Rose Gilo · 20問 · 11ヶ月前

    BILL OF RIGHTS

    BILL OF RIGHTS

    20問 • 11ヶ月前
    Jamaica Rose Gilo

    PEACE & HUMAN RIGHTS ISSUES AND CONCEPTS

    PEACE & HUMAN RIGHTS ISSUES AND CONCEPTS

    Jamaica Rose Gilo · 8問 · 11ヶ月前

    PEACE & HUMAN RIGHTS ISSUES AND CONCEPTS

    PEACE & HUMAN RIGHTS ISSUES AND CONCEPTS

    8問 • 11ヶ月前
    Jamaica Rose Gilo

    RA 6713

    RA 6713

    Jamaica Rose Gilo · 9問 · 11ヶ月前

    RA 6713

    RA 6713

    9問 • 11ヶ月前
    Jamaica Rose Gilo

    MATH PROBLEMS AND BASIC OPERATIONS

    MATH PROBLEMS AND BASIC OPERATIONS

    Jamaica Rose Gilo · 62問 · 11ヶ月前

    MATH PROBLEMS AND BASIC OPERATIONS

    MATH PROBLEMS AND BASIC OPERATIONS

    62問 • 11ヶ月前
    Jamaica Rose Gilo

    問題一覧

  • 1

    someone identifies himself as another person to obtain free medical care

    Medical Identity Theft

  • 2

    someone uses another person's identity or information to obtain credit, goods, services or benefits. This is the most common form of identity theft.

    Financial Identity Theft

  • 3

    someone uses a child's identity for various forms of personal gain

    Child Identity Theft

  • 4

    is a type of fraud in which a criminal combines real (usually stolen) and fake information to create a new identity, which is used to open fraudulent accounts and make fraudulent purchases

    Synthetic Identity Theft

  • 5

    It allows the criminal to steal money from any credit card companies or lenders who extend credit based on the fake identity.

    Synthetic Identity Theft

  • 6

    is when a bad actor steals the personal information and credentials of an unwitting individual in order to pose as them fo unauthorized purchases or financial transactions

    Identity Theft

  • 7

    can come in various forms, but in all cases the victim is left with damage to their credit, finances, reputation, and livelihood in many case

    Identity Theft

  • 8

    is a growing industry that keeps track of people's credit reports, financial activity, and social security number use

    Identity Theft Protection

  • 9

    Identity thieves increasingly use computer technology to obtain other people's personal information for identity fraud.

    High-Tech Identity Theft

  • 10

    "America's fastest growing crime problem"

    Identity Theft

  • 11

    One way is to continually check the accuracy of personal documents and promptly deal with any discrepancies.

    Identity Theft Protection

  • 12

    In addition, some government agencies and non-profit organizations provide similar assistance, typically with websites that have information and tools to help people avoid, remedy and report incidents of identity theft.

    Identity Theft Protection

  • 13

    What is the goal of computer security?

    Institute controls that preserve secrecy, integrity and availability.

  • 14

    controls that attempt to prevent exploitation of the vulnerabilities of computing systems

    Encryption, Software Controls, Hardware Controls, Overlapping Controls, Periodic Review

  • 15

    The most powerful tool in providing computer security is ______.

    coding

  • 16

    It provides secrecy of data.

    Encryption

  • 17

    It can also be used to achieve integrity, since data that cannot be read generally also cannot be changed.

    Encryption

  • 18

    It is important in protocols.

    Encryption

  • 19

    are agreed-upon sequences of actions to accomplish some task

    Protocols

  • 20

    These are the 2nd link in computer security and must be secure enough to excuse outside attack. As well as, must be maintained and developed so that one can be confident of the dependability of the programs.

    Programs

  • 21

    Kinds of Program Controls

    Development Controls, OS Controls, Internal Program Controls

  • 22

    which are standards under which a program is designed, coded, tested, and maintained

    Development Controls

  • 23

    which are limitations enforced by the operating system to protect each user from all other users

    OS Controls

  • 24

    enforce security restrictions, such as access limitations in a data base management program

    Internal Program Controls

  • 25

    These may use tools such as hardware components, encryption or information gathering. These can also generally affect users directly and so these are the 1st aspect in computer security that come to mind. Lastly, these must be DESIGNED.

    Software Controls

  • 26

    What are the goals of designed software controls?

    Ease of Use, Potency

  • 27

    3 levels of hardware controls

    Policies, Physical Controls, Effectiveness of Controls

  • 28

    People using controls must be convinced of the need for security; people will willingly cooperate with security requirements only if they understand why security is appropriate in each specific situation. Many users, however, are unaware of the need for security, especially in situations in which a group has recently undertaken computing task that was previously performed by a central computing department.

    Awareness of Problem

  • 29

    Of course, no control is effective unless it is used. The lock on a computer room door does no good if people block the door open. During World War 2 code clerks used outdated codes because they had already learned them and could encode messages rapidly. Unfortunately, the opposite side had already broken some of those codes and could decode those messages easily.

    Likelihood of Use

  • 30

    Controls must be used to be effective. They must be efficient, easy to use, and appropriate.

    Principle of Effectiveness

  • 31

    This principle implies that computer security controls must be efficient enough, in terms of time, memory space, human activity, or other resources used, so that using the control does not seriously affect the task being protected. Controls should be selective so that they do not exclude legitimate accesses.

    Principle of Effectiveness

  • 32

    Several different controls may apply to one exposure.

    Overlapping Controls

  • 33

    Few controls are permanently effective. Just when the security specialist finds a way to secure assets against certain kinds of attacks, the opposition doubles its efforts in an effort to defeat the security mechanism. Thus, judging the effectiveness of a control is an ongoing task.

    Periodic Review