Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
11 Cards in this Set
- Front
- Back
Intention
|
Originate from actions that are carried out deliberately
|
|
Unintentional
|
Actions that are carried out by accident or ignorance.
|
|
Active Threat
|
is a danger posed by an attack in which the attacker trespasses and modifies data, or affects system operations.
|
|
Passive Threat
|
is a danger posed by an attack in which the attacker does not trespass, modify data, or affect system operations. Stealling passworesd by looking "listening" to network communication, overhearing a conversation, stealing data from trash.
|
|
Physical Security
|
locking down assets with tangible locking mechanisms.
Alarms, cameras security guards, and badge-protected doors are security controls. |
|
Physical Theft
|
Items stolen
|
|
Physical Damage/Vandalism
|
Look
|
|
Service Disruption
|
attackers can sabotage and damae via indirect means of cutting of power, severing network or telephone lines, interrupting air conditioning,
|
|
Unauthorized Access to System
|
attacker can shut down system, remove data, install malicious code, boot system using different OS, bypass screen savers,
|
|
Unauthorized Access to System
|
attacker can shut down system, remove data, install malicious code, boot system using different OS, bypass screen savers,
|
|
Unauthorized Access to information
|
Employees need to work together to keep passive threats of unauthorized acces to information that may not be stored on IT systems.
Ease Dropping, and external drives allow attacks to easily gain nformation |