Chapter 5: Protecting information resources Flashcards

1
Q

Risks with I.T

A
  • privacy issues
  • computer crimes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How to mitigate risks

A
  1. Anti-virus
  2. E-mail security measures
  3. Regularly update operating system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Spyware

A

Software which secretly gathers information about users while they are on the web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Adware

A

Form of spyware which collects information from the user in order to display advertisements in the Web browser without the user’s permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Phishing

A

Sends fraudulent e-mails that seem to come from legitimate sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Keystroke loggers

A

keeps track of and records your keystrokes as you type. It takes the information and sends it to a hacker using a command-and-control (C&C) server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Sniffing

A

he act of intercepting and monitoring traffic on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Spoofing (faking ones identity)

A

Attempt to gain access to network by appearing to be an authorized user in order to gain access to sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

three aspects of security

A
  1. Integrity
  2. Confidentiality
  3. Availability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Confidentiality

A

prevent disclosing information to unauthorized users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Integrity

A

Accuracy of information resources within organisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Availability

A
  1. Authorised users has access when needed
  2. Computers and network in working order
  3. Quick recovery in event of system failure or disaster
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How threats can be classified

A

As either intentional or unintentional

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Intentional threats

A
  1. Hacker attacks
  2. Spreading of virus
  3. Attacks by upset employees
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Unintentional threats

A
  1. Natural disasters
  2. Accidental deletion of data
  3. Structural failures
How well did you know this?
1
Not at all
2
3
4
5
Perfectly