A(n) ____ is a flaw or weakness that allows a threat agent to bypass security.
Asset
Vulnerability
Threat agent
Threat
A(n) ____ is a type of action that has the potential to cause harm.
Threat
Vulnerability
Asset
Threat agent
Due to overwhelmed vendors trying to keep pace by updating their products against attacks
Distributed attacks
Delays in security updating
User confusion
Simplicity of attack tools
Faster detection of vulnerabilities
Universally connected devices
Greater sophistication of attacks
Personal medical devices
Speed of attacks
Potentially the next target for attackers.
Distributed attacks
Delays in security updating
User confusion
Simplicity of attack tools
Faster detection of vulnerabilities
Universally connected devices
Greater sophistication of attacks
Personal medical devices
Speed of attacks
Made possible by new software tools and techniques
Distributed attacks
Delays in security updating
User confusion
Simplicity of attack tools
Faster detection of vulnerabilities
Universally connected devices
Greater sophistication of attacks
Personal medical devices
Speed of attacks
Results in attackers that can launch attacks against millions of computers within minutes
Distributed attacks
Delays in security updating
User confusion
Simplicity of attack tools
Faster detection of vulnerabilities
Universally connected devices
Greater sophistication of attacks
Personal medical devices
Speed of attacks
Results in attack tools that can vary their behavior so the same attack appears differently each time
Distributed attacks
Delays in security updating
User confusion
Simplicity of attack tools
Faster detection of vulnerabilities
Universally connected devices
Greater sophistication of attacks
Personal medical devices
Speed of attacks
Results in attacks that are no longer limited to highly skilled attackers
Distributed attacks
Delays in security updating
User confusion
Simplicity of attack tools
Faster detection of vulnerabilities
Universally connected devices
Greater sophistication of attacks
Personal medical devices
Speed of attacks
Allows attackers from anywhere in the world can send attacks
Distributed attacks
Delays in security updating
User confusion
Simplicity of attack tools
Faster detection of vulnerabilities
Universally connected devices
Greater sophistication of attacks
Personal medical devices
Speed of attacks
Happens when attackers use thousands of computers in an attack against a single computer or network
Distributed attacks
Delays in security updating
User confusion
Simplicity of attack tools
Faster detection of vulnerabilities
Universally connected devices
Greater sophistication of attacks
Personal medical devices
Speed of attacks
Happens when users are required to make difficult security decisions with little or no instruction
Distributed attacks
Delays in security updating
User confusion
Simplicity of attack tools
Faster detection of vulnerabilities
Universally connected devices
Greater sophistication of attacks
Personal medical devices
Speed of attacks
Financial cybercrime is often divided into two categories. The first category focuses on individuals and businesses.
Distributed attacks
Delays in security updating
User confusion
Simplicity of attack tools
Faster detection of vulnerabilities
Universally connected devices
Greater sophistication of attacks
Personal medical devices
Speed of attacks
____ involves stealing another person’s personal information, such as a Social Security number, and then using the information to impersonate the victim, generally for financial gain
Cyberterrorism
White hat hacking
Identity theft
Digital fraud
____ ensures that information is correct and no unauthorized person or malicious software has altered that data.
Protection
Integrity
Confidentiality
Availability
The FBI defines ____ as any “premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against non-combatant targets by sub-national groups or clandestine agents.”
Cyberterrorism
Cyberware
Information warfare
Terrorism
____ ensures that data is accessible when needed to authorized users.
Integrity
Confidentiality
Availability
Non-repudiation
Information (contained on the devices) is protected by three layers: products, ____, and policies and procedures.
People
Applications
Systems
Tools
A(n) ____ is a person or element that has the power to carry out a threat.
Attack agent
Risk
Vulnerability
Threat agent
{"name":"A(n) ____ is a flaw or weakness that allows a threat agent to bypass security.", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"A(n) ____ is a flaw or weakness that allows a threat agent to bypass security., A(n) ____ is a type of action that has the potential to cause harm.","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}
Powered by: Quiz Maker