Home
Subjects
Textbook solutions
Create
Study sets, textbooks, questions
Log in
Sign up
Upgrade to remove ads
Only $35.99/year
Chapter 1 Review Questions
STUDY
Flashcards
Learn
Write
Spell
Test
PLAY
Match
Gravity
Terms in this set (20)
Each of the following is a reason why it is difficult to defend against today's attackers except:
complexity of attack tools
In a general sense "security" is:
the steps necessary to protect a person or property from harm
_____ ensures that only authorized parties can view the information.
Confidentiality
Why can brokers command such a high price for what they sell?
The vulnerability they uncover was previously unknown and is unlikely to be patched quickly
Each of the following is a successive layer in which information security is achieved except:
purposes
What is a person or element that has the power to carry out a threat?
threat agent
In information security terminology a(n) _____ is a flaw or weakness that allows an attacker to bypass security protections.
vulnerability
______ ensures that individuals are who they claim to be.
Authentication
The ______ requires that enterprises must guard protected health information and implement policies and procedures to safeguard it.
Health Insurance Portability and Accountability Act (HIPAA)
The motivation of _______ is attacking for the sake of their principles or beliefs.
cyberterrorists
What is the difference between a hactivist and a cyberterrorist?
The aim of a hactivist is not to incite panic like cyberterrorists.
Keeping backup copies of important data stored in a safe place is an example of
minimizing losses
Each of the following can be classified as an "insider" except
cybercriminals
What is an objective of state-sponsored attackers?
to spy on citizens
Each of the following is a characteristic of cybercriminals except
low motivation
Each of the following is a characteristic of cybercrime except
exclusive use of worms and viruses
An example of a(n) ______ is a software defect in an operating system that allows an unauthorized user to gain access to a computer without a password.
vulnerability
_______ requires banks and financial institutions to alert customers of their policies and practices in disclosing customer information and to protect all electronic devices and paper containing personally identifiable financial information.
Gramm-Leach-Bliley Act (GLBA)
_______ ensures that the information is correct and no unauthorized person or malicious software has altered that data.
Integrity
Protecting information is accomplished by
protecting the devices on which the information is found
Sets found in the same folder
Network Security Chapters 1-3
50 terms
Chapter 2 Review Questions
20 terms
Chapter 3 Review Questions
20 terms
Chapter 4 Review Questions
20 terms
Other sets by this creator
Web Development Chapter 14
10 terms
Network Security Chapters 4-6
25 terms
Chapter 5 Review Questions
20 terms
Web Development Ch 5
10 terms
Other Quizlet sets
1.4: Plattformen
34 terms
ch 14- religion
45 terms
Meridians Midterm 2
72 terms
Pharm 3
23 terms