Term
|
Definition
| Security can be considered as a state of freedom from danger or risk. |
|
|
Term
|
Definition
| Confidentiality, Integrity, Availability. |
|
|
Term
| What is an example of an Asset? |
|
Definition
| Car Stereo. Something that has value. |
|
|
Term
| What is an example of a Threat? |
|
Definition
|
|
Term
| What is an example of a Threat? |
|
Definition
| Steal stereo from car. An event or object that may defeat the security measures in place and result in a loss. |
|
|
Term
| What is an example of a Threat Agent? |
|
Definition
| Theif. A person or thing that has the power to carry out a threat. |
|
|
Term
| What is an example of a Vulnerability |
|
Definition
| Hole in fence. Something that allows a threat to bypass security. |
|
|
Term
| What is an example of a Exploit? |
|
Definition
| Climb through hole in fence. When something can be done via a hole in the system. |
|
|
Term
| What is an example of a Risk? |
|
Definition
| Transfer to insurance company. The likelihood something will be stolen. |
|
|
Term
|
Definition
| Surprise attack by terrorist groups using computer technology and the Internet. |
|
|
Term
| The Sarbanes-Oxley Act (SOX) deals with what? |
|
Definition
| Deals with fighting company corruption. Covers the corporate officers, auditors, and attorneys of publicly traded companies. Requires internal control of electronic financial reports. |
|
|
Term
|
Definition
| A computer expert who illegally breaks into or attempts to break into a computer system. |
|
|
Term
|
Definition
| Script Kiddies want to break into computers to create damage. |
|
|
Term
|
Definition
| A person who has been hired to beak into computer systems and steal information. |
|
|
Term
|
Definition
| A loose-knit network of attackers, identity thieves, and financial fraudsters. |
|
|
Term
| What are the steps of an attack? |
|
Definition
| Probe for information, penetrate any defenses, modify security settings, circulate to other systems, and paralyze networks and devices. |
|
|
Term
|
Definition
| Layering is having layers of security. Layering allows for stronger defenses. |
|
|
Term
|
Definition
| Limiting who can access your network or who has privileges. Least amount of access is necessary in maintaining a safe network. |
|
|
Term
|
Definition
| Diversity is closely related to layering. Different layers that have products or security by different vendors. One attacker couldn't possibly master multiple defense systems. |
|
|