Chapter 2

studied byStudied by 38 people
5.0(1)
Get a hint
Hint

Bring your own device (BYOD)

1 / 54

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

55 Terms

1

Bring your own device (BYOD)

a business policy that permits, and in some cases encourages, employees to use their own mobile devices (smartphones, tablets, or laptops) to access company computing resources and applications.

New cards
2

Exploit

an attack on information system that takes advaantage of a particular system vulnerablity

New cards
3

Zero Day Attack

an attack that takes place before the security community becomes aware of and fixes a security vulnerability.

New cards
4

Careless insider

An inside (employee, business partner, contractor, consultant) who does not follow the organization’s security polices and enables a cyberattack to occur

New cards
5

Malicious employees

An insider who deliberately attempts to gain access to and/or disrupt a company’s information systems and business operations

New cards
6

Cybercriminal

Someone who attacks a computer system or network for financial gain

New cards
7

Hacktivist

An individual who hacks computers or Web sites in order to promote a political ideology

New cards
8

Lone wolf attacker

Someone who violates computer or Internet security maliciously or for illegal personal gain

New cards
9

Cyberterrorist

State-sponsored individual or group who attempts to destroy the infrastructure components of governments, financial institutions, corporations, utilities, and emergency response units

New cards
10

attack vector

The technique used to gain unauthorized access to a device or a network.

New cards
11

Advanced persistent threat

A network attack in which an intruder gains access to a network and stays there—undetected—with the intention of stealing data over a long period of time.

New cards
12

Blended threat

A sophisticated threat that combines the features of a virus, worm, Trojan horse, and other malicious code into a single payload.

New cards
13

Phishing

The act of fraudulently using email to try to get the recipient to reveal personal data.

New cards
14

Rootkit

A set of programs that enables its user to gain administrator-level access to a computer without the end user’s consent or knowledge. Once installed, the attacker can gain full control of the system and even obscure the presence of the rootkit from legitimate system administrators.

New cards
15

Smishing

A variation of phishing that involves the use of texting.

New cards
16

Social engineering

The use of deception to trick individuals into divulging data needed to gain access to an information system or network.

New cards
17

Spam

The use of email systems to send unsolicited email to large numbers of people.

New cards
18

Trojan horse

A seemingly harmless program in which malicious code is hidden. A victim on the receiving end of a Trojan horse is usually tricked into opening it because it appears to be useful software from a legitimate source.

New cards
19

Virus

A piece of programming code, usually disguised as something else, that causes a computer to behave in an unexpected and usually undesirable manner.

New cards
20

Vishing

Similar to smishing except that the victims receive a voice mail message telling them to call a phone number or access a Web site.

New cards
21

Worm

A harmful program that resides in the active memory of the computer and duplicates itself. Worms differ from viruses in that they can propagate without human intervention, often sending copies of themselves to other computers by email.

New cards
22

Ransomware

is malware that stops you from using your computer or accessing the data on your computer until you meet certain demands, such as paying a ransom or, in some cases, sending compromising photos to the attacker

New cards
23

distributed denial-of-service (DDoS) attack

A cyberattack in which a malicious hacker takes over computers via the Internet and causes them to flood a target site with demands for data and other small tasks.

New cards
24

botnet

A large group of computers controlled from one or more remote locations by hackers without the knowledge or consent of their owners.

New cards
25

data breach

The unintended release of sensitive data or the access of sensitive data by unauthorized individuals.

New cards
26

Cyberespionage

The deployment of malware that secretly steals data in the computer systems of organizations.

New cards
27

Cyberterrorism

The intimidation of government or civilian population by using information technology to disable critical national infrastructure (e.g., energy, transportation, financial, law enforcement, emergency response) to achieve political, religious, or ideological goals.

New cards
28

Department of Homeland Security (DHS)

A large federal agency with more than 240,000 employees and a budget of almost $65 billion whose goal is to provide for a “safer, more secure America, which is resilient against terrorism and other potential threats.”

New cards
29

U.S. Computer Emergency Readiness Team (US-CERT)

A partnership between the Department of Homeland Security and the public and private sectors; established to provide timely handling of security incidents as well as conducting improved analysis of such incidents.

New cards
30

DIRECT IMPACT

This is the value of the assets (cash, inventory, equipment, patents, copyrights, trade secrets, data) stolen or damaged due to the cyberattack.

New cards
31

BUSINESS DISRUPTION

A successful cyberattack may make it impossible for the organization to operate in an effective manner for several hours or days. This can cause a loss of existing business and customers as well as the loss of potential new business and customers.

New cards
32

Recovery cost

It may take people from the IS organization and business areas days or weeks to repair affected systems and recover lost or compromised data.

New cards
33

Legal consequences

There is the prospect of monetary penalties for businesses that fail to comply with data protection legislation. For example, the European Union General Data Protection Regulation (GDPR) has established strong guidelines for how organizations process and handle data so that the personal information of individuals is protected.

New cards
34

Reputation damage

A successful cyberattack can erode the trust your organization has established with your customers, suppliers, business partners, and shareholders.

New cards
35

CIA security triad

Confidentiality, integrity, and availability form the basis of the CIA security triad.

New cards
36

Risk assessment

The process of assessing security-related risks to an organization’s computers and networks from both internal and external threats.

New cards
37

reasonable assurance

The recognition that managers must use their judgment to ensure that the cost of control does not exceed the system’s benefits or the risks involved.

New cards
38

disaster recovery plan

A documented process for recovering an organization’s business information system assets—including hardware, software, data, networks, and facilities—in the event of a disaster such as a flood, fire, or electrical outage.

New cards
39

business continuity plan

A document that includes an organization’s disaster recovery plan, occupant emergency evacuation plan, continuity of operations plan, and an incident management plan.

New cards
40

mission-critical processes

A process that plays a pivotal role in an organization’s continued operations and goal attainment.

New cards
41

Failover

A backup technique that involves automatically switching applications and programs to a redundant or replicated server, network, or database to prevent interruption of service.

New cards
42

security policy

Defines an organization’s security requirements, as well as the controls and sanctions needed to meet those requirements.

New cards
43

security audit

A process that enables the organization to identify its potential threats, establish a benchmark of where it is, determine where it needs to be, and develop a plan to meet those needs.

New cards
44

Biometric authentication

The process of verifying your identity using your physiological measurements (fingerprint, shape of your face, shape of your hand, vein pattern, your iris, or retina) or behavioral measurements (voice recognition, gait, gesture, or other unique behaviors).

New cards
45

firewall

A system of software, hardware, or a combination of both that stands guard between an organization’s internal network and the Internet, and limits network access based on the organization’s access policy.

New cards
46

next-generation firewall (NGFW)

A hardware- or software-based network security system that can detect and block sophisticated attacks by filtering network traffic dependent on the packet contents.

New cards
47

Encryption

The process of scrambling messages or data in such a way that only authorized parties can read it.

New cards
48

encryption key

A value that is applied (using an algorithm) to a set of unencrypted text (plaintext) to produce encrypted text that appears as a series of seemingly random characters (ciphertext) that is unreadable by those without the encryption key needed to decipher it.

New cards
49

Transport Layer Security (TLS)

A communications protocol or system of rules that ensures privacy between communicating applications and their users on the Internet.

New cards
50

Antivirus software

Should be installed on each user’s personal computer to scan a computer’s memory and disk drives regularly for viruses.

New cards
51

virus signature

Code that indicates the presence of a specific virus.

New cards
52

intrusion detection system (IDS)

Software and/or hardware that monitors system and network resources and activities and notifies network security personnel when it detects network traffic that attempts to circumvent the security measures of a networked computer environment.

New cards
53

managed security service provider (MSSP)

A company that monitors, manages, and maintains computer and network security for other organizations.

New cards
54

Computer forensics

A discipline that combines elements of law and computer science to identify, collect, examine, and preserve data from computer systems, networks, and storage devices in a manner that preserves the integrity of the data gathered so that it is admissible as evidence in a court of law.

New cards
55
New cards

Explore top notes

note Note
studied byStudied by 10 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 5 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 11 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 12 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 6 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 12 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 12 people
Updated ... ago
5.0 Stars(2)
note Note
studied byStudied by 205 people
Updated ... ago
5.0 Stars(1)

Explore top flashcards

flashcards Flashcard25 terms
studied byStudied by 23 people
Updated ... ago
5.0 Stars(3)
flashcards Flashcard52 terms
studied byStudied by 24 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard50 terms
studied byStudied by 13 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard44 terms
studied byStudied by 12 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard72 terms
studied byStudied by 4 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard24 terms
studied byStudied by 33 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard28 terms
studied byStudied by 1 person
Updated ... ago
5.0 Stars(1)
flashcards Flashcard149 terms
studied byStudied by 37 people
Updated ... ago
5.0 Stars(1)