Term
|
Definition
Security can be considered as a state of freedom from danger or risk. |
|
|
Term
|
Definition
Confidentiality, Integrity, Availability. |
|
|
Term
What is an example of an Asset? |
|
Definition
Car Stereo. Something that has value. |
|
|
Term
What is an example of a Threat? |
|
Definition
|
|
Term
What is an example of a Threat? |
|
Definition
Steal stereo from car. An event or object that may defeat the security measures in place and result in a loss. |
|
|
Term
What is an example of a Threat Agent? |
|
Definition
Theif. A person or thing that has the power to carry out a threat. |
|
|
Term
What is an example of a Vulnerability |
|
Definition
Hole in fence. Something that allows a threat to bypass security. |
|
|
Term
What is an example of a Exploit? |
|
Definition
Climb through hole in fence. When something can be done via a hole in the system. |
|
|
Term
What is an example of a Risk? |
|
Definition
Transfer to insurance company. The likelihood something will be stolen. |
|
|
Term
|
Definition
Surprise attack by terrorist groups using computer technology and the Internet. |
|
|
Term
The Sarbanes-Oxley Act (SOX) deals with what? |
|
Definition
Deals with fighting company corruption. Covers the corporate officers, auditors, and attorneys of publicly traded companies. Requires internal control of electronic financial reports. |
|
|
Term
|
Definition
A computer expert who illegally breaks into or attempts to break into a computer system. |
|
|
Term
|
Definition
Script Kiddies want to break into computers to create damage. |
|
|
Term
|
Definition
A person who has been hired to beak into computer systems and steal information. |
|
|
Term
|
Definition
A loose-knit network of attackers, identity thieves, and financial fraudsters. |
|
|
Term
What are the steps of an attack? |
|
Definition
Probe for information, penetrate any defenses, modify security settings, circulate to other systems, and paralyze networks and devices. |
|
|
Term
|
Definition
Layering is having layers of security. Layering allows for stronger defenses. |
|
|
Term
|
Definition
Limiting who can access your network or who has privileges. Least amount of access is necessary in maintaining a safe network. |
|
|
Term
|
Definition
Diversity is closely related to layering. Different layers that have products or security by different vendors. One attacker couldn't possibly master multiple defense systems. |
|
|