BTE 210 Exam 2 PT. 2

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/55

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 12:55 AM on 3/18/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

56 Terms

1
New cards

Factor Contributing to Vulnerability 1

today’s interconnected, interdependent, wirelessly networked business environment

2
New cards

Factor Contributing to Vulnerability 2

Smaller, faster, cheapter computers and storage devices

3
New cards

Factor Contributing to Vulnerability 3

decreasing skills necessary to be a computer hacker

4
New cards

Factor Contributing to Vulnerability 4

International organized crime is taking over cybercrime

5
New cards

Factor Contributing to Vulnerability 5

Lack of management support

6
New cards

Security

The degree of protection against criminal activity, danger, damage, and/or loss.

7
New cards

Information Security

all processes and policies to protect organizations info and info systems from unauthorized access

8
New cards

Greatest human error threat

Higher level employees

9
New cards

Human error two areas of significant threat

Human resources and information systems

10
New cards

Human error peripheral threats

contract labor, consultants, janitors, and guard

11
New cards

Carelessness with laptops

common human error

12
New cards

Carelessness with computing devices

common human error

13
New cards

Opening questionable e-mails

common human error

14
New cards

Careless internet surfing

common human errors

15
New cards

Poor password selection and use

common human error

16
New cards

Carelessness with one’s office

common human error

17
New cards

Carelessness with discarded equipment

common human error

18
New cards

careless monitoring of environmental hazards

common human error

19
New cards

Espionage or trespass

deliberate threats to information systems

20
New cards

Information extortion

deliberate threats to information systems

21
New cards

Sabotage or vandalism

deliberate threats to information systems

22
New cards

SCADA Attacks

used to monitor the chemical, physical, and transport ; deliberate threats to information systems

23
New cards

Cyberterrorism and cyberwarfare

often political ; deliberate threats to information systems

24
New cards

Software attacks requiring user action (4)

Virus, worm, phishing attack, spear phishing attack

25
New cards

Virus

segment of malicious code

26
New cards

Worm

segment of malicious code that self replicates

27
New cards

Phishing

Poses as legit organizations

28
New cards

Spear phishing

Target large groups of people; more targeted

29
New cards

Software attacks not needing user action (2)

Denial of Service attack, distributed denial of service attack

30
New cards

Denial of Service Attack

so many information requests that crashes the computer

31
New cards

Distributed denial of service attacj

Creates multiple computer bots and thus a botnet to target a single computer

32
New cards

Software attacks created by a programmer developing a system

Trojan horse, back door, logic bomb

33
New cards

Trojan Horse

hides in other computer programs and reveal their behavior once activated

34
New cards

Back Door

Attacker knows a password to access computer at will

35
New cards

Logic Bomb

Specific action at a time or date 

36
New cards

Alien Software

Adware, spyware

37
New cards

Adware

Generates pop-up ads

38
New cards

Spyware

Collects personal information without consent

39
New cards

Inside threats employees

application programmer, systems programmers, operations, users

40
New cards

Application programmer

program applications to function contrary to specifications

41
New cards

Systems Programmer

Bypass security, disable security, install non-secure systems

42
New cards

Operations

Duplicate records, initializing non-secure system, theft of material

43
New cards

Users

data entry errors, weak passwords, lack of training

44
New cards

Inside Threats (hardware)

Terminals, PCS, Databases

45
New cards

Terminals

Located in nonsecure environment

46
New cards

PCS

Fraud ID, illegal leakage, malware, theft

47
New cards

Databases

Unauthorized access, copying, theft

48
New cards

Outside threats (internets)

Malware, denial of service, unauthorized users

49
New cards

Corporate LAN defense mechanisms physical controls

Human guard, ID,

50
New cards

Corporate LAN defense mechanisms access controls

Authentication, password, personal ID

51
New cards


Corporate LAN defense mechanisms communications controls

Firewall

52
New cards

Access Control Types

Authentication, authorization

53
New cards

Authentication

User is, has, does, knows

54
New cards

Authorization

anti-malware, firewall, encryption (can only be read by the reader)

55
New cards

Comment for C++

//

56
New cards

Comment for Python

#

Explore top notes

note
18.1 to 18.3 Organic Chemistry
Updated 1316d ago
0.0(0)
note
IB Film HL Story Notes
Updated 922d ago
0.0(0)
note
Celldelning
Updated 172d ago
0.0(0)
note
T2 H1
Updated 426d ago
0.0(0)
note
Finance Class Notes
Updated 1373d ago
0.0(0)
note
Chapter 29: Waste Water Treatment
Updated 1070d ago
0.0(0)
note
A Day with My Cat
Updated 97d ago
0.0(0)
note
DCB Week 1
Updated 392d ago
0.0(0)
note
18.1 to 18.3 Organic Chemistry
Updated 1316d ago
0.0(0)
note
IB Film HL Story Notes
Updated 922d ago
0.0(0)
note
Celldelning
Updated 172d ago
0.0(0)
note
T2 H1
Updated 426d ago
0.0(0)
note
Finance Class Notes
Updated 1373d ago
0.0(0)
note
Chapter 29: Waste Water Treatment
Updated 1070d ago
0.0(0)
note
A Day with My Cat
Updated 97d ago
0.0(0)
note
DCB Week 1
Updated 392d ago
0.0(0)

Explore top flashcards

flashcards
The Russian Revolution
27
Updated 1063d ago
0.0(0)
flashcards
BIO 101 Exam 3 (Chapters 7-10)
230
Updated 875d ago
0.0(0)
flashcards
An Inspector Call quotes
29
Updated 24d ago
0.0(0)
flashcards
virtual relationships
24
Updated 491d ago
0.0(0)
flashcards
Latin America History Review
28
Updated 346d ago
0.0(0)
flashcards
Mech Test 3
144
Updated 1089d ago
0.0(0)
flashcards
🇫🇷
75
Updated 296d ago
0.0(0)
flashcards
The Russian Revolution
27
Updated 1063d ago
0.0(0)
flashcards
BIO 101 Exam 3 (Chapters 7-10)
230
Updated 875d ago
0.0(0)
flashcards
An Inspector Call quotes
29
Updated 24d ago
0.0(0)
flashcards
virtual relationships
24
Updated 491d ago
0.0(0)
flashcards
Latin America History Review
28
Updated 346d ago
0.0(0)
flashcards
Mech Test 3
144
Updated 1089d ago
0.0(0)
flashcards
🇫🇷
75
Updated 296d ago
0.0(0)