idk Flashcards

(32 cards)

1
Q

malware designed to damage destroy or delay service to target systems

A

Deliberate software attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

types of deliberates software attacks

A

Viruses, worms, trojan horses, logic bombs, back/trap door, polymorphic threats, virus/worm hoaxes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Is depends on many interdependent support systems
Internet services, communications irregularities

A

Deviation in quality of service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Access of protected info by unauthorized individuals

A

Espionage/ trespass

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Expert hacker

A

Develops software scripts and program exploits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Most dangerous

A

Forces of nature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Individual lives, storage, transmission, use of information

A

Disrupts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Acts performed without malicious intent

A

Human error/ failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Steals information, demands compensation
Credit card

A

Information extortion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Can make organizations vulnerable to loss damage or disclosure of information assets

A

Missing inadequate or incomplete

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Website defacing can erode consumer confidence dropping sales organizations net worth

A

Sabotage or vandalism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

more sinister form of hacking

A

Cyberterrorism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Illegal taking of another’s physical, electronic or intellectual property

A

theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Occur when manufacturer distributes equipment containing flaws to users

A

Technical hardware failure or errors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

True or false: some errors are terminal; some are intermittent

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Purchased software that contains unrevealed faults

A

Technical software failures or errors

17
Q

Antiquated/outdated infrastructure can lead to unreliable untrustworthy systems

A

Technological obsolescence

18
Q

Execution of viruses, warns, ths
Intent to steal/destroy info

A

Malicious code

19
Q

Virus hoax with real virus attached
More devious form of attack

20
Q

Gaining access using known/previously unknown/ newly discovered access mechanisms

21
Q

Attempting to reverse calculate a password

A

Password crack

22
Q

Trying every possible combination

23
Q

Most important

24
Q

Awareness

25
Most difficult
Training
26
Educate
Education
27
Not static
Technology
28
CIA triangle
Confidentiality, integrity, availability
29
Systems administrators attempt to improve security of their systems
Grassroots effort
30
Grassroots effort, technical expertise of indiv admins, lacks a number of critical features: participant support organizational staying power
Bottom - up approach
31
Initiated by upper management and involve development strategy referred to as systems development life cycle
top-down approach
32
intellectual property rights
patent trademark trade secret copyright