hello quizlet
Home
Subjects
Expert solutions
Create
Study sets, textbooks, questions
Log in
Sign up
Upgrade to remove ads
Only $35.99/year
Social Science
Sociology
Chap 1 - Intro to Security
Flashcards
Learn
Test
Match
Flashcards
Learn
Test
Match
Terms in this set (39)
INSIDER
A type of threat that can come from employees, contractors and business partners. (ie. a disgruntled employee)
SERIAL SERVER
Connects a remote system through the Internet to local serial ports using TCP/IP.
ACCOUNTING
The ability that provides tracking of events.
GRAMM-LEACH-BLILEY ACT (GLBA)
A law that requires banks and financial institutions to alert customers of their policies and practices in disclosing customer information.
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA)
U.S. law designed to guard protected health information and implement policies and procedures to safeguard it.
SECURITY TECHNICIAN
It is considered a entry level position for a person who has the necessary technical skills.
FALSE
(T/F) The demand for certified IT professionals who know how to secure networks and computers is at an all-time low.
THEFT OF INFORMATION, A DELAY IN TRANSMITTING INFORMATION THAT RESULTS IN A FINANCIAL PENALTY AND/OR THE LOSS OF GOOD WILL OR REPUTATION.
In information security, what constitutes a loss?
CYBERCRIMINALS
A network of attackers, identity thieves, spammers, and financial fraudsters.
CONFIDENTIALITY
Security actions that ensure that only authorized parties can view the information.
INFORMATION SECURITY
A broad term frequently used to describe the tasks of securing information that is in a digital format.
RISK
A situation involving exposure to danger.
CYBERTERRORISM
A premeditated, politically motivated attack against information, computer systems, computer programs, and data which often results in violence.
THREAT AGENT
A person or element that has the power to carry out a threat.
THREAT VECTOR
The means by which an attack could occur.
ASSET
An item that has value.
EXPLOIT KIT
Automated attack package that can be used without an advanced knowledge of computers. (ie Script Kiddies)
THREAT
A type of action that has the potential to cause harm.
VULNERABILITY
A flaw or weakness that allows a threat agent to bypass security.
HACTIVIST
Attacker who attacks for ideological reasons that are generally not as well-defined as a cyberterrorist's motivation.
IDENTITY THEFT
A crime that involves stealing another person's personal information (ie Social Security number, DOB, address, etc) and then using the information to impersonate the victim for financial gain.
22%
According to the US Bureau of Labor Statistics, what percentage of growth is the available job outlook supposed to reach by the end of the decade?
EXPLOIT KIT
Automated attack package that can be used without an advanced knowledge of computers. (ie. script kiddies)
TRUE
(T/F) Security is the goal to be free from danger as well as the process that achieves that freedom.
INTEGRITY
Information protection item that ensures that information is correct and that no unauthorized person or malicious software has altered that data.
a force of nature such as a tornado that could destroy computer equipment
a virus that attacks a computer network
A person attempting to break into a secure computer network
What are some examples of what a threat agent can be?
Indonesia
What country is now the # 1 source of attack traffic?
TRUE
(T/F) The CompTIA Security+ Certification is aimed at an IT security professional with the recommended background of a minimum of 2 years experience in IT administration with a focus on security.
$1,500,000
Those who wrongfully disclose individually identifiable health information can be fined up to what amount per calendar year?
TRUE
(T/F) A security administration has both technical knowledge and managerial skills.
Love Bug
To date, the single most expensive malicious attack occurred in 2000, which cost an estimated $8.7 billion. What was the name of this attack?
AUTHENTICATION
The security protection item that ensure that the individual that ensures that the individual is who they claim to be (authentic or genuine person) and not an imposter is known as?
DISTRIBUTED
In what kind of attack can attackers make use of hundreds of thousands of computers under their control in an attack against a single server or network?
TRUE
(T/F) Today's software attack tools do not require any sophisticated knowledge on the part of the attacker.
Risk Avoidance
Proper ________________ involves identifying risks but making the decision to not engage in the activity
SCRIPT KIDDIES
What term best describes individuals who want to attack computers yet lack the knowledge of computers and networks needed to do so?
MANAGER
What information security position reports to the CISO and supervises technicians, administrators and security staff?
Chief Information Security Officer (CISO)
The person who reports directly to the Chief Information Officer (CIO) and is responsible for assessing, managing and implementing security.
vulnerability
An example of a(n) _____________that information security must deal w/is a software defect in an operating system that allows an unauthorized user to gain access to a computer w/o the user's knowledge of permission.
Sets found in the same folder
CHAP 2 - MALWARE AND SOCIAL ENGINEERING ATTACKS
39 terms
Chap 4 - Host, Application and Data Security
40 terms
CHAP 3 - THREATS
39 terms
CHAP 7 - NETWORK SECURITY FUNDAMENTALS
37 terms
Other sets by this creator
CHAP 7
30 terms
CHAP 2
8 terms
CHAP 1
35 terms
MID TERM
50 terms
Verified questions
question
Actual demand for a product for the past three months was $$ \begin{array}{ll} \hline \text { Three months ago } & 400 \text { units } \\ \text { Two months ago } & 350 \text { units } \\ \text { Last month } & 325 \text { units } \\ \hline \end{array} $$ a. Using a simple three-month moving average, make a forecast for this month. b. If $300$ units were actually demanded this month, what would your forecast be for next month? c. Using simple exponential smoothing, what would your forecast be for this month if the exponentially smoothed forecast for three months ago was $450$ units and the smoothing constant was $0.20$ ?
algebra
The table shows U.S. gross domestic product ($\mathrm{GDP}$ ) in billions of dollars for selected years from $2000$ to $2070$ (actual and projected). | **Year** | **$\mathrm{GDP}$** | **Year** | **$\mathrm{GDP}$** | | :--- | ---: | ---: | :---: | | $2000$ | $9143$ | $2040$ | $79,680$ | | $2005$ | $12,145$ | $2045$ | $103,444$ | | $2010$ | $16,174$ | $2050$ | $133,925$ | | $2015$ | $21,270$ | $2055$ | $173,175$ | | $2020$ | $27,683$ | $2060$ | $224,044$ | | $2025$ | $35,919$ | $2065$ | $290,042$ | | $2030$ | $46,765$ | $2070$ | $375,219$ | | $2035$ | $61,100$ | | | *Source*: Social Security Administration Trustees Report Assume that the $\mathrm{GDP}$ can be modeled with the function $$ \begin{gathered} G(t)=213(0.2 t+5)^3-5020(0.2 t+5)^2 \\ +8810 t+104,000 \end{gathered} $$ where $G(t)$ is in billions of dollars and $t$ is the number of years past $2000$. (a) Use the model to find and interpret the instanta- neous rates of change of the $\mathrm{GDP}$ in $2015$ and $2025$. (b) Use the data in the table to find the average rate of change of the $\mathrm{GDP}$ from $2015$ to $2025$. ( c ) How well does your answer from part (b) approximate the instantaneous rate of change of $\mathrm{GDP}$ in $2020$?
finance
Chapman Company acquires 100% of Abernethy Company’s stock on January 1, 2020. As of that date, Abernethy has the following trial balance: <center> | | Debit | Credit | |-----------------------------------------|:-------------:|:-------------:| | Accounts payable | | $50,000 | | Accounts receivable |$ 40,000 | | | Additional paid-in capital | | 50,000 | | Buildings (net) (4-year remaining life) | 120,000 | | | Cash and short-term investments | 60,000 | | | Common stock | | 250,000 | | Equipment (net) (5-year remaining life) | 200,000 | | | Inventory | 90,000 | | | Land | 80,000 | | | Long-term liabilities (mature 12/31/23) | | 150,000 | | Retained earnings, 1/1/20 | | 100,000 | | Supplies | 10,000 | | | Totals | **$600,000** | **$ 600,000** | </center> During 2020, Abernethy reported net income of $80,000 while declaring and paying dividends of$10,000. During 2021, Abernethy reported net income of $110,000 while declaring and paying dividends of$30,000. Assume that Chapman Company acquired Abernethy’s common stock by paying $520,000 in cash.All of Abernethy’s accounts are estimated to have a fair value approximately equal to present book values. Chapman uses the partial equity method to account for its investment. Prepare the consolidation worksheet entries for December 31, 2020, and December 31, 2021.
algebra
Find the total parking fee at Manny's for each of these times. $4$ hours
Recommended textbook solutions
Operations Management: Sustainability and Supply Chain Management
12th Edition
•
ISBN: 9780134163451
(7 more)
Barry Render, Chuck Munson, Jay Heizer
1,698 solutions
Anderson's Business Law and the Legal Environment, Comprehensive Volume
23rd Edition
•
ISBN: 9781305575080
David Twomey, Marianne Jennings, Stephanie Greene
369 solutions
Operations Management
13th Edition
•
ISBN: 9781259667473
William Stevenson
980 solutions
Operations Management: Sustainability and Supply Chain Management
12th Edition
•
ISBN: 9780134163567
Barry Render, Chuck Munson, Jay Heizer
1,698 solutions
Other Quizlet sets
World War II
20 terms
Psychopathology Test 4
54 terms
ECON Exam 5
56 terms
Chapter 1 History WW1
76 terms