• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/11

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

11 Cards in this Set

  • Front
  • Back
Intention
Originate from actions that are carried out deliberately
Unintentional
Actions that are carried out by accident or ignorance.
Active Threat
is a danger posed by an attack in which the attacker trespasses and modifies data, or affects system operations.
Passive Threat
is a danger posed by an attack in which the attacker does not trespass, modify data, or affect system operations. Stealling passworesd by looking "listening" to network communication, overhearing a conversation, stealing data from trash.
Physical Security
locking down assets with tangible locking mechanisms.

Alarms, cameras security guards, and badge-protected doors are security controls.
Physical Theft
Items stolen
Physical Damage/Vandalism
Look
Service Disruption
attackers can sabotage and damae via indirect means of cutting of power, severing network or telephone lines, interrupting air conditioning,
Unauthorized Access to System
attacker can shut down system, remove data, install malicious code, boot system using different OS, bypass screen savers,
Unauthorized Access to System
attacker can shut down system, remove data, install malicious code, boot system using different OS, bypass screen savers,
Unauthorized Access to information
Employees need to work together to keep passive threats of unauthorized acces to information that may not be stored on IT systems.

Ease Dropping, and external drives allow attacks to easily gain nformation