Part 4 Flashcards Preview

Information Security Fundamentals > Part 4 > Flashcards

Flashcards in Part 4 Deck (20)
Loading flashcards...
0

Beware of ____

Common Misconceptions

1

Businesses must understand that any network that is connected to the Internet is a ____, regardless of the type of business

potential target

2

Attackers will attempt to ____ and its systems for several reasons.

gain access to a network

3

The first is to look around to see what they can find. Regardless of the type of business, ____ will more than likely be stored on one of the systems. This includes Social Security numbers and other ____. This type of information is a target—always.

personnel information
personal information

4

Another possibility is that the attacker will ____ the information he or she finds or simply ____ the systems to behave abnormally.

modify,reconfigure

5

This type of attacker is not interested in financial gain; he is simply the technology version of teenagers who soap windows, egg cars, and cover property with toilet paper. He attacks because he finds it _____ to do so.

entertaining

6

Additionally, these attackers could use the systems to ____ stolen “property” such as child pornography or credit-card numbers.

store

7

If a system is not secure, attackers can ____ these types of materials on your system and ____ to them at their leisure.

store, gain access

8

The final possibility is that an attacker will use the hacked systems to ____ on other unprotected networks and systems.

mount attacks

9

Computers can be used to mount ____, relay spam, or spread malicious software.

denial-of-service (DoS) attacks

10

To put it simply, _____

no computer or network is immune from attack.

11

Another common misconception is that an organi- zation is immune from problems caused by ____, essentially saying, “We trust all our ___, so we don’t have to focus our energies on protecting our assets from them.”

employees

12

Though this is common for small businesses in which the owners know everyone, it also occurs in larger organizations where companies believe that they only hire “____.

professionals

13

It is important to remember that no matter how well job candidates present them- selves, a business can never know everything about an employee’s past. For this reason it is important for busi- nesses to conduct _____ of all employees. Furthermore, it is important to conduct these _____ properly and completely.

preemployment background checks

14

However, peo-ple’s lives and fortunes can change during the ____.

course of employment

15

____ can cause otherwise law-abiding citizens to take risks they never would have thought possible.

Financial pressures

16

____ can alter people’s behavior as well.

Drug and alcohol dependency

17

It is important to recognize that although an individual might be very knowledgeable and technologically sophisticated, ____

no one knows everything about computers.

18

Because ____ does not understand technology, they are not in a very good position to judge a person’s depth of knowledge and experience in the field.

management

19

When it comes to security we must keep in mind that it is a ____, and implementing a strong security posture requires significant ____

specialized area, training and experience.