Security – Chapter 02 – Review* – Flashcards

Unlock all answers in this set

Unlock answers
question
Why is information security a management problem? What can management do that technology cannot?
answer
Answers soon
question
Why is data the most important asset an organization possesses? What other assets in the organization require protection?
answer
Answers soon
question
Which management groups are responsible for implementing information security to protect the organization's ability to function?
answer
...
question
Has the implementation of networking technology created more or less risk for businesses that use information technology? Why?
answer
...
question
What is information extortion? Describe how such an attack can cause losses, using an example not found in the text.
answer
...
question
Why do employees constitute one of the greatest threats to information security?
answer
...
question
What measures can individuals take to protect against shoulder surfing?
answer
...
question
How has the perception of the hacker changed over recent years? What is the profile of a hacker today?
answer
...
question
What is the difference between a skilled hacker and an unskilled hacker (other than skill levels)? How does the protection against each differ?
answer
...
question
What are the various types of malware? How do worms differ from viruses? Do Trojan horses carry viruses or worms?
answer
...
question
Why does polymorphism cause greater concern than traditional malware? How does it affect detection?
answer
...
question
What is the most common form of violation of intellectual property? How does an organization protect against it? What agencies fight it?
answer
...
question
What are the various types of force majeure? Which type might be of greatest concern to an organization in Las Vegas? Oklahoma City? Miami? Los Angeles?
answer
...
question
How does technological obsolescence constitute a threat to information security? How can an organization protect against it?
answer
...
question
Does the intellectual property owned by an organization usually have value? If so, how can attackers threaten that value?
answer
...
question
What are the types of password attacks? What can a systems administrator do to protect against them?
answer
...
question
What is the difference between a denial-of-service attack and a distributed denial-of-service attack? Which is more dangerous? Why?
answer
...
question
For a sniffer attack to succeed, what must the attacker do? How can an attacker gain access to a network to use the sniffer system?
answer
...
question
What methods does a social engineering hacker use to gain information about a user's login id and password? How would this method differ if it were targeted towards an administrator's assistant versus a data-entry clerk?
answer
...
question
What is a buffer overflow, and how is it used against a Web server?
answer
...
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New