Flashcards in Part 4 Deck (20)
Beware of ____
Businesses must understand that any network that is connected to the Internet is a ____, regardless of the type of business
Attackers will attempt to ____ and its systems for several reasons.
gain access to a network
The first is to look around to see what they can find. Regardless of the type of business, ____ will more than likely be stored on one of the systems. This includes Social Security numbers and other ____. This type of information is a target—always.
Another possibility is that the attacker will ____ the information he or she finds or simply ____ the systems to behave abnormally.
This type of attacker is not interested in financial gain; he is simply the technology version of teenagers who soap windows, egg cars, and cover property with toilet paper. He attacks because he finds it _____ to do so.
Additionally, these attackers could use the systems to ____ stolen “property” such as child pornography or credit-card numbers.
If a system is not secure, attackers can ____ these types of materials on your system and ____ to them at their leisure.
store, gain access
The final possibility is that an attacker will use the hacked systems to ____ on other unprotected networks and systems.
Computers can be used to mount ____, relay spam, or spread malicious software.
denial-of-service (DoS) attacks
To put it simply, _____
no computer or network is immune from attack.
Another common misconception is that an organi- zation is immune from problems caused by ____, essentially saying, “We trust all our ___, so we don’t have to focus our energies on protecting our assets from them.”
Though this is common for small businesses in which the owners know everyone, it also occurs in larger organizations where companies believe that they only hire “____.
It is important to remember that no matter how well job candidates present them- selves, a business can never know everything about an employee’s past. For this reason it is important for busi- nesses to conduct _____ of all employees. Furthermore, it is important to conduct these _____ properly and completely.
preemployment background checks
However, peo-ple’s lives and fortunes can change during the ____.
course of employment
____ can cause otherwise law-abiding citizens to take risks they never would have thought possible.
____ can alter people’s behavior as well.
Drug and alcohol dependency
It is important to recognize that although an individual might be very knowledgeable and technologically sophisticated, ____
no one knows everything about computers.
Because ____ does not understand technology, they are not in a very good position to judge a person’s depth of knowledge and experience in the field.