IAS chap 2 Flashcards
(36 cards)
Items of fact collected by an organization.
raw numbers, facts, and words
Data
practice of protecting digital information from unauthorized access, corruption, or theft throughout its entire lifecycle.
Data security
an intentional or unintentional act that can damage or otherwise compromise information and the systems that support it.
Attack
an object, person, or other entity that represents a constant danger to an asset
Threat
the ownership of ideas and control over the tangible or virtual representation of those ideas
Intellectual property (IP)
most common IP breach
It is an unauthorized duplication, installation, or distribution of computer software
Software Piracy
uses unethical means to collection and analyze the information about an organization’s business competitors
Industrial espionage
– protect equipment against spikes, surges and blackouts for a limited period
Uninterruptible power supply (UPS)
A document that specifies the expected level of service from a service provider
Service Level Agreement (SLA)
an electronic and human activities that can breach the confidentiality of information
Espionage or Trespass
analysis of information of other company thru a legal techniques
Competitive intelligence
one of the greatest threat in an organization asset
Employee
is a broad range of malicious activities accomplished through psychological manipulation of people
Social engineering
relies on the curiosity or greed of the victim
Baiting
looking over someone’s shoulder to get information
Shoulder Surfing / Pretexting
click on links to malicious websites
mainly conducted through emails and phone calls
Phishing
more targeted version of phishing, send a customize message to their target (high officials)
Spear Fishing
mainly conducted through emails and phone calls
Whaling
victim is deceived to think their system is infected to installing fake antivirus
Scareware
involve injecting malware that encrypts a victim’s critical data
Ransomware
help attacker to gain unauthorized access into an organization physical facilities
Tailgating
attacker retrieved discarded information thrown in trash
Dumpster Diving
an attack that denies access and offer fee to the victim to return their access
Ransomware
computer software specifically designed to perform malicious or unwanted actions.
Malware