1/12
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Negligent insiders
_____ are poorly trained and inadequately managed employees who mean well but have the potential to cause much damage.
Spear-phishing
_____ is the sending of fraudulent emails to an organization's employees designed to look like they came from high-level executives from within the organization.
Hackers
_____ test the limitations of information systems out of intellectual curiosity to see whether they can gain access and how far they can go.
distributed denial-of-service
A _____ attack keeps the target so busy responding to a stream of automated requests that legitimate users cannot get in.
It is true a risk assessment identifies most dangerous threats to a company
A completed risk assessment identifies the most dangerous threats to a company and helps focus security efforts on the areas of highest payoff. T/F
It is true an intrusion detection system monitors system and network activities etc
An intrusion detection system monitors system and network resources and activities, and notifies the network security when it detects attempts to circumvent the security measures of a networked computer environment. T/F
It is false regarding competitive intelligence
Competitive intelligence is conducted by industrial spies. T/F
Is it true that employees and contract workers must be educated about the importance of security
Employees and contract workers must be educated about the importance of security so that they will be motivated to understand and follow the security policies. T/F
exploit
In computing, a(n) _____ is a term for any sort of general attack on an information system that takes advantage of a particular system vulnerability.
U.S. Computer Emergency Readiness Team
The _____ is a partnership between the Department of Homeland Security and the public and private sectors, established in 2003 to protect the nation's Internet infrastructure against cyberattacks.
reasonable assurance
The concept of _____ recognizes that managers must use their judgment to ensure that the cost of control does not exceed the system's benefits or the risks involved.
it is true that automated system rules should mirror written policies
Whenever possible, automated system rules should mirror an organization's written policies. T/F
Collusion
The cooperation between an employee of a company and an outsider to commit fraud against the company is called _____.