IAS chap 2 Flashcards

(36 cards)

1
Q

Items of fact collected by an organization.
raw numbers, facts, and words

A

Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

practice of protecting digital information from unauthorized access, corruption, or theft throughout its entire lifecycle.

A

Data security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

an intentional or unintentional act that can damage or otherwise compromise information and the systems that support it.

A

Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

an object, person, or other entity that represents a constant danger to an asset

A

Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

the ownership of ideas and control over the tangible or virtual representation of those ideas

A

Intellectual property (IP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

most common IP breach

It is an unauthorized duplication, installation, or distribution of computer software

A

Software Piracy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

uses unethical means to collection and analyze the information about an organization’s business competitors

A

Industrial espionage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

– protect equipment against spikes, surges and blackouts for a limited period

A

Uninterruptible power supply (UPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A document that specifies the expected level of service from a service provider

A

Service Level Agreement (SLA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

an electronic and human activities that can breach the confidentiality of information

A

Espionage or Trespass

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

analysis of information of other company thru a legal techniques

A

Competitive intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

one of the greatest threat in an organization asset

A

Employee

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

is a broad range of malicious activities accomplished through psychological manipulation of people

A

Social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

relies on the curiosity or greed of the victim

A

Baiting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

looking over someone’s shoulder to get information

A

Shoulder Surfing / Pretexting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

click on links to malicious websites
mainly conducted through emails and phone calls

13
Q

more targeted version of phishing, send a customize message to their target (high officials)

A

Spear Fishing

13
Q

mainly conducted through emails and phone calls

14
Q

victim is deceived to think their system is infected to installing fake antivirus

15
Q

involve injecting malware that encrypts a victim’s critical data

16
Q

help attacker to gain unauthorized access into an organization physical facilities

17
Q

attacker retrieved discarded information thrown in trash

A

Dumpster Diving

18
Q

an attack that denies access and offer fee to the victim to return their access

19
Q

computer software specifically designed to perform malicious or unwanted actions.

20
A type of malware that is capable of activation and replication without being attached to an existing program.
Worms
21
is a computer program that attaches itself to an executable file or application.
Virus
22
A malware program that hides its true nature and reveals its designed behavior only when activated.
Trojan Horses
23
changing its size and other external file characteristics to elude detection by antivirus software programs.
Polymorphic Threats
24
time and money are spent resolving virus hoaxes.
Virus and Worm Hoaxes -
25
A malware payload that provides access to a system by bypassing normal access controls.
Back Doors
26
an attack that attempts to overwhelm a computer target’s ability to handle incoming communications, prohibiting legitimate users from accessing those systems.
DoS (Denial of Service)
27
Spam is unsolicited commercial e-mail
Email Attacks
28
attack designed to overwhelm the receiver with excessive quantities of e-mail
Mail bomb
29
technique for gaining unauthorized access to computers using a forged or modified source IP address to give the perception that messages are coming from a trusted host.
Spoofing
30
The redirection of legitimate user Web traffic to illegitimate Web sites with the intent to collect personal information.
Pharming
31
A group of attacks whereby a person intercepts a communications stream and insert himself in the conversation to convince each of the legitimate parties that he is the other communications partner.
Man-in-the-Middle -