Question | Answer |
Threat | An object, person, or other entity that presents an ongoing danger to an asset. |
Theft | The illegal taking of another’s property, which can be physical, electronic, or intellectual. |
Virus | Consists of segments of code that perform malicious actions |
Worm | A malicious program that replicates itself constantly, without requiring another program environment |
Trojan horses | Software programs that hide their true nature and reveal their designed behavior only when activated |
Back door | Component in a system, which allows the attacker to access the system at, will with special privileges |
Polymorphic threat | One that over time changes the way it appears to antivirus software programs, making it undetectable by techniques that look for preconfigured signatures |
Virus hoaxes | e-mails warning of supposedly dangerous viruses that don’t exist |
Trespass | Unauthorized real or virtual actions that enable information gatherers to enter premises or systems they have not been authorized to enter |
Shoulder surfing | Used in public or semi-public settings when individuals gather information they are not authorized to have by looking over another individual’s shoulder or viewing the information from a distance |
Hackers | “people who use and create computer software [to] gain access to information illegally.” |
Script kiddies | Hackers of limited skill who use expertly written software to attack a system |
Packet monkeys | Script kiddies who use automated exploits to engage in distributed denial-of-service attacks |
Human Error or Failure | Acts performed without malicious intent |
Information Extortion | Attacker steals information from computer system and demands compensation for its return or nondisclosure |
TRUE or FALSE A worm requires that another program is running before it can begin functioning | FALSE |
TRUE Or FALSE Much human error or failure can be prevented with training and ongoing awareness activities | TRUE |
TRUE Or FALSE Information security’s primary mission is to ensure that systems and their contents retain their confidentiality at all costs | FALSE |
TRUE Or FALSE A firewall is a mechanism that keeps certain kinds of network traffic out of a private network | TRUE |
TRUE Or FALSE A worm can deposit copies of itself onto all Web servers that the infected system can reach, so that users who subsequently visit those sites become infected | TRUE |
List at least six general categories of threat | - Malicious Code - Back Doors - Hoaxes - Password Crack - Denial of Service and Distribution - Spoofing |
What is a Worm? | A worm is a malicious program that replicates itself constantly, without requiring another environment. Worms can continue replicating themselves until they completely fill available resources, such as memory, hard drive space, and network bandwidth. |
Want to create your own Flashcards for free with GoConqr? Learn more.