Lesson 1 Flashcards
(13 cards)
What are the three ends to the intrusion triangle?
Opportunity, Motive, Means
What are the three principles of network security?
Confidentiality, Integrity, Availability
[True or False] A key principle of security is that no network is completely secure
True
Risk Management takes what four forms?
- Acceptance
- Mitigation
- Transference
- Avoidance
When accepting risk, it is always a good idea to create a _________ ____
contingency plan
What is the most common method of securing computers and networks?
Mitigating security risks
What is a very simple way of mitigating security risks on client machines?
Installing antivirus software
Using a cloud hosting service is an example of what kind of risk management?
Transferring Risk
What is the opposite of accepting risk?
Avoiding the risk
What is the IC3?
The Internet Crime Complaint Center
What are the four types of attacks?
- Operating system
- Application level
- Misconfiguration
- Shrink wrap code
An Unpatched operating system is an example of what type of attack?
Operating System Attack
What are the four principles that a security policy must have?
- Standards
- Guidelines
- Procedures
- Baselines